command.c revision 79119
1/*-
2 * Copyright (c) 1996 - 2001 Brian Somers <brian@Awfulhak.org>
3 *          based on work by Toshiharu OHNO <tony-o@iij.ad.jp>
4 *                           Internet Initiative Japan, Inc (IIJ)
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 *    notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 *    notice, this list of conditions and the following disclaimer in the
14 *    documentation and/or other materials provided with the distribution.
15 *
16 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
17 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
20 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26 * SUCH DAMAGE.
27 *
28 * $FreeBSD: head/usr.sbin/ppp/command.c 79119 2001-07-03 01:02:26Z brian $
29 */
30
31#include <sys/param.h>
32#include <netinet/in_systm.h>
33#include <netinet/in.h>
34#include <netinet/ip.h>
35#include <arpa/inet.h>
36#include <sys/socket.h>
37#include <net/route.h>
38#include <netdb.h>
39#include <sys/un.h>
40
41#include <ctype.h>
42#include <errno.h>
43#include <fcntl.h>
44#include <paths.h>
45#include <stdio.h>
46#include <stdlib.h>
47#include <string.h>
48#include <sys/wait.h>
49#include <termios.h>
50#include <unistd.h>
51
52#ifndef NONAT
53#ifdef LOCALNAT
54#include "alias.h"
55#else
56#include <alias.h>
57#endif
58#endif
59
60#include "layer.h"
61#include "defs.h"
62#include "command.h"
63#include "mbuf.h"
64#include "log.h"
65#include "timer.h"
66#include "fsm.h"
67#include "iplist.h"
68#include "throughput.h"
69#include "slcompress.h"
70#include "lqr.h"
71#include "hdlc.h"
72#include "lcp.h"
73#include "ipcp.h"
74#ifndef NONAT
75#include "nat_cmd.h"
76#endif
77#include "systems.h"
78#include "filter.h"
79#include "descriptor.h"
80#include "main.h"
81#include "route.h"
82#include "ccp.h"
83#include "auth.h"
84#include "async.h"
85#include "link.h"
86#include "physical.h"
87#include "mp.h"
88#ifndef NORADIUS
89#include "radius.h"
90#endif
91#include "bundle.h"
92#include "server.h"
93#include "prompt.h"
94#include "chat.h"
95#include "chap.h"
96#include "cbcp.h"
97#include "datalink.h"
98#include "iface.h"
99#include "id.h"
100
101/* ``set'' values */
102#define	VAR_AUTHKEY	0
103#define	VAR_DIAL	1
104#define	VAR_LOGIN	2
105#define	VAR_AUTHNAME	3
106#define	VAR_AUTOLOAD	4
107#define	VAR_WINSIZE	5
108#define	VAR_DEVICE	6
109#define	VAR_ACCMAP	7
110#define	VAR_MRRU	8
111#define	VAR_MRU		9
112#define	VAR_MTU		10
113#define	VAR_OPENMODE	11
114#define	VAR_PHONE	12
115#define	VAR_HANGUP	13
116#define	VAR_IDLETIMEOUT	14
117#define	VAR_LQRPERIOD	15
118#define	VAR_LCPRETRY	16
119#define	VAR_CHAPRETRY	17
120#define	VAR_PAPRETRY	18
121#define	VAR_CCPRETRY	19
122#define	VAR_IPCPRETRY	20
123#define	VAR_DNS		21
124#define	VAR_NBNS	22
125#define	VAR_MODE	23
126#define	VAR_CALLBACK	24
127#define	VAR_CBCP	25
128#define	VAR_CHOKED	26
129#define	VAR_SENDPIPE	27
130#define	VAR_RECVPIPE	28
131#define	VAR_RADIUS	29
132#define	VAR_CD		30
133#define	VAR_PARITY	31
134#define VAR_CRTSCTS	32
135#define VAR_URGENTPORTS	33
136#define	VAR_LOGOUT	34
137#define	VAR_IFQUEUE	35
138#define	VAR_MPPE	36
139
140/* ``accept|deny|disable|enable'' masks */
141#define NEG_HISMASK (1)
142#define NEG_MYMASK (2)
143
144/* ``accept|deny|disable|enable'' values */
145#define NEG_ACFCOMP	40
146#define NEG_CHAP05	41
147#define NEG_CHAP80	42
148#define NEG_CHAP80LM	43
149#define NEG_DEFLATE	44
150#define NEG_DNS		45
151#define NEG_ENDDISC	46
152#define NEG_LQR		47
153#define NEG_PAP		48
154#define NEG_PPPDDEFLATE	49
155#define NEG_PRED1	50
156#define NEG_PROTOCOMP	51
157#define NEG_SHORTSEQ	52
158#define NEG_VJCOMP	53
159#define NEG_MPPE	54
160#define NEG_CHAP81	55
161
162const char Version[] = "2.3.2";
163
164static int ShowCommand(struct cmdargs const *);
165static int TerminalCommand(struct cmdargs const *);
166static int QuitCommand(struct cmdargs const *);
167static int OpenCommand(struct cmdargs const *);
168static int CloseCommand(struct cmdargs const *);
169static int DownCommand(struct cmdargs const *);
170static int SetCommand(struct cmdargs const *);
171static int LinkCommand(struct cmdargs const *);
172static int AddCommand(struct cmdargs const *);
173static int DeleteCommand(struct cmdargs const *);
174static int NegotiateCommand(struct cmdargs const *);
175static int ClearCommand(struct cmdargs const *);
176static int RunListCommand(struct cmdargs const *);
177static int IfaceAddCommand(struct cmdargs const *);
178static int IfaceDeleteCommand(struct cmdargs const *);
179static int IfaceClearCommand(struct cmdargs const *);
180static int SetProcTitle(struct cmdargs const *);
181#ifndef NONAT
182static int NatEnable(struct cmdargs const *);
183static int NatOption(struct cmdargs const *);
184#endif
185
186static const char *
187showcx(struct cmdtab const *cmd)
188{
189  if (cmd->lauth & LOCAL_CX)
190    return "(c)";
191  else if (cmd->lauth & LOCAL_CX_OPT)
192    return "(o)";
193
194  return "";
195}
196
197static int
198HelpCommand(struct cmdargs const *arg)
199{
200  struct cmdtab const *cmd;
201  int n, cmax, dmax, cols, cxlen;
202  const char *cx;
203
204  if (!arg->prompt) {
205    log_Printf(LogWARN, "help: Cannot help without a prompt\n");
206    return 0;
207  }
208
209  if (arg->argc > arg->argn) {
210    for (cmd = arg->cmdtab; cmd->name || cmd->alias; cmd++)
211      if ((cmd->lauth & arg->prompt->auth) &&
212          ((cmd->name && !strcasecmp(cmd->name, arg->argv[arg->argn])) ||
213           (cmd->alias && !strcasecmp(cmd->alias, arg->argv[arg->argn])))) {
214	prompt_Printf(arg->prompt, "%s %s\n", cmd->syntax, showcx(cmd));
215	return 0;
216      }
217    return -1;
218  }
219
220  cmax = dmax = 0;
221  for (cmd = arg->cmdtab; cmd->func; cmd++)
222    if (cmd->name && (cmd->lauth & arg->prompt->auth)) {
223      if ((n = strlen(cmd->name) + strlen(showcx(cmd))) > cmax)
224        cmax = n;
225      if ((n = strlen(cmd->helpmes)) > dmax)
226        dmax = n;
227    }
228
229  cols = 80 / (dmax + cmax + 3);
230  n = 0;
231  prompt_Printf(arg->prompt, "(o) = Optional context,"
232                " (c) = Context required\n");
233  for (cmd = arg->cmdtab; cmd->func; cmd++)
234    if (cmd->name && (cmd->lauth & arg->prompt->auth)) {
235      cx = showcx(cmd);
236      cxlen = cmax - strlen(cmd->name);
237      if (n % cols != 0)
238        prompt_Printf(arg->prompt, " ");
239      prompt_Printf(arg->prompt, "%s%-*.*s: %-*.*s",
240              cmd->name, cxlen, cxlen, cx, dmax, dmax, cmd->helpmes);
241      if (++n % cols == 0)
242        prompt_Printf(arg->prompt, "\n");
243    }
244  if (n % cols != 0)
245    prompt_Printf(arg->prompt, "\n");
246
247  return 0;
248}
249
250static int
251IdentCommand(struct cmdargs const *arg)
252{
253  int f, pos;
254
255  *arg->cx->physical->link.lcp.cfg.ident = '\0';
256
257  for (pos = 0, f = arg->argn; f < arg->argc; f++)
258    pos += snprintf(arg->cx->physical->link.lcp.cfg.ident + pos,
259                    sizeof arg->cx->physical->link.lcp.cfg.ident - pos, "%s%s",
260                    f == arg->argn ? "" : " ", arg->argv[f]);
261
262  return 0;
263}
264
265static int
266SendIdentification(struct cmdargs const *arg)
267{
268  if (arg->cx->state < DATALINK_LCP) {
269    log_Printf(LogWARN, "sendident: link has not reached LCP\n");
270    return 2;
271  }
272  return lcp_SendIdentification(&arg->cx->physical->link.lcp) ? 0 : 1;
273}
274
275static int
276CloneCommand(struct cmdargs const *arg)
277{
278  char namelist[LINE_LEN];
279  char *name;
280  int f;
281
282  if (arg->argc == arg->argn)
283    return -1;
284
285  namelist[sizeof namelist - 1] = '\0';
286  for (f = arg->argn; f < arg->argc; f++) {
287    strncpy(namelist, arg->argv[f], sizeof namelist - 1);
288    for(name = strtok(namelist, ", "); name; name = strtok(NULL,", "))
289      bundle_DatalinkClone(arg->bundle, arg->cx, name);
290  }
291
292  return 0;
293}
294
295static int
296RemoveCommand(struct cmdargs const *arg)
297{
298  if (arg->argc != arg->argn)
299    return -1;
300
301  if (arg->cx->state != DATALINK_CLOSED) {
302    log_Printf(LogWARN, "remove: Cannot delete links that aren't closed\n");
303    return 2;
304  }
305
306  bundle_DatalinkRemove(arg->bundle, arg->cx);
307  return 0;
308}
309
310static int
311RenameCommand(struct cmdargs const *arg)
312{
313  if (arg->argc != arg->argn + 1)
314    return -1;
315
316  if (bundle_RenameDatalink(arg->bundle, arg->cx, arg->argv[arg->argn]))
317    return 0;
318
319  log_Printf(LogWARN, "%s -> %s: target name already exists\n",
320             arg->cx->name, arg->argv[arg->argn]);
321  return 1;
322}
323
324int
325LoadCommand(struct cmdargs const *arg)
326{
327  const char *err;
328  int n, mode;
329
330  mode = arg->bundle->phys_type.all;
331
332  if (arg->argn < arg->argc) {
333    for (n = arg->argn; n < arg->argc; n++)
334      if ((err = system_IsValid(arg->argv[n], arg->prompt, mode)) != NULL) {
335        log_Printf(LogWARN, "%s: %s\n", arg->argv[n], err);
336        return 1;
337      }
338
339    for (n = arg->argn; n < arg->argc; n++) {
340      bundle_SetLabel(arg->bundle, arg->argv[arg->argc - 1]);
341      system_Select(arg->bundle, arg->argv[n], CONFFILE, arg->prompt, arg->cx);
342    }
343    bundle_SetLabel(arg->bundle, arg->argv[arg->argc - 1]);
344  } else if ((err = system_IsValid("default", arg->prompt, mode)) != NULL) {
345    log_Printf(LogWARN, "default: %s\n", err);
346    return 1;
347  } else {
348    bundle_SetLabel(arg->bundle, "default");
349    system_Select(arg->bundle, "default", CONFFILE, arg->prompt, arg->cx);
350    bundle_SetLabel(arg->bundle, "default");
351  }
352
353  return 0;
354}
355
356int
357SaveCommand(struct cmdargs const *arg)
358{
359  log_Printf(LogWARN, "save command is not implemented (yet).\n");
360  return 1;
361}
362
363static int
364DialCommand(struct cmdargs const *arg)
365{
366  int res;
367
368  if ((arg->cx && !(arg->cx->physical->type & (PHYS_INTERACTIVE|PHYS_AUTO)))
369      || (!arg->cx &&
370          (arg->bundle->phys_type.all & ~(PHYS_INTERACTIVE|PHYS_AUTO)))) {
371    log_Printf(LogWARN, "Manual dial is only available for auto and"
372              " interactive links\n");
373    return 1;
374  }
375
376  if (arg->argc > arg->argn && (res = LoadCommand(arg)) != 0)
377    return res;
378
379  bundle_Open(arg->bundle, arg->cx ? arg->cx->name : NULL, PHYS_ALL, 1);
380
381  return 0;
382}
383
384#define isinword(ch) (isalnum(ch) || (ch) == '_')
385
386static char *
387strstrword(char *big, const char *little)
388{
389  /* Get the first occurance of the word ``little'' in ``big'' */
390  char *pos;
391  int len;
392
393  pos = big;
394  len = strlen(little);
395
396  while ((pos = strstr(pos, little)) != NULL)
397    if ((pos != big && isinword(pos[-1])) || isinword(pos[len]))
398      pos++;
399    else if (pos != big && pos[-1] == '\\')
400      memmove(pos - 1, pos, strlen(pos) + 1);
401    else
402      break;
403
404  return pos;
405}
406
407static char *
408subst(char *tgt, const char *oldstr, const char *newstr)
409{
410  /* tgt is a malloc()d area... realloc() as necessary */
411  char *word, *ntgt;
412  int ltgt, loldstr, lnewstr, pos;
413
414  if ((word = strstrword(tgt, oldstr)) == NULL)
415    return tgt;
416
417  ltgt = strlen(tgt) + 1;
418  loldstr = strlen(oldstr);
419  lnewstr = strlen(newstr);
420  do {
421    pos = word - tgt;
422    if (loldstr > lnewstr)
423      bcopy(word + loldstr, word + lnewstr, ltgt - pos - loldstr);
424    if (loldstr != lnewstr) {
425      ntgt = realloc(tgt, ltgt += lnewstr - loldstr);
426      if (ntgt == NULL)
427        break;			/* Oh wonderful ! */
428      word = ntgt + pos;
429      tgt = ntgt;
430    }
431    if (lnewstr > loldstr)
432      bcopy(word + loldstr, word + lnewstr, ltgt - pos - loldstr);
433    bcopy(newstr, word, lnewstr);
434  } while ((word = strstrword(word, oldstr)));
435
436  return tgt;
437}
438
439void
440command_Expand(char **nargv, int argc, char const *const *oargv,
441               struct bundle *bundle, int inc0, pid_t pid)
442{
443  int arg;
444  char pidstr[12];
445
446  if (inc0)
447    arg = 0;		/* Start at arg 0 */
448  else {
449    nargv[0] = strdup(oargv[0]);
450    arg = 1;
451  }
452  snprintf(pidstr, sizeof pidstr, "%d", (int)pid);
453  for (; arg < argc; arg++) {
454    nargv[arg] = strdup(oargv[arg]);
455    nargv[arg] = subst(nargv[arg], "HISADDR",
456                       inet_ntoa(bundle->ncp.ipcp.peer_ip));
457    nargv[arg] = subst(nargv[arg], "AUTHNAME", bundle->cfg.auth.name);
458    nargv[arg] = subst(nargv[arg], "INTERFACE", bundle->iface->name);
459    nargv[arg] = subst(nargv[arg], "MYADDR", inet_ntoa(bundle->ncp.ipcp.my_ip));
460    nargv[arg] = subst(nargv[arg], "USER", bundle->ncp.mp.peer.authname);
461    nargv[arg] = subst(nargv[arg], "PEER_ENDDISC",
462                       mp_Enddisc(bundle->ncp.mp.peer.enddisc.class,
463                                  bundle->ncp.mp.peer.enddisc.address,
464                                  bundle->ncp.mp.peer.enddisc.len));
465    nargv[arg] = subst(nargv[arg], "ENDDISC",
466                       mp_Enddisc(bundle->ncp.mp.cfg.enddisc.class,
467                                  bundle->ncp.mp.cfg.enddisc.address,
468                                  bundle->ncp.mp.cfg.enddisc.len));
469    nargv[arg] = subst(nargv[arg], "PROCESSID", pidstr);
470    nargv[arg] = subst(nargv[arg], "LABEL", bundle_GetLabel(bundle));
471    nargv[arg] = subst(nargv[arg], "DNS0",
472                       inet_ntoa(bundle->ncp.ipcp.ns.dns[0]));
473    nargv[arg] = subst(nargv[arg], "DNS1",
474                       inet_ntoa(bundle->ncp.ipcp.ns.dns[1]));
475    nargv[arg] = subst(nargv[arg], "VERSION", Version);
476    nargv[arg] = subst(nargv[arg], "COMPILATIONDATE", __DATE__);
477  }
478  nargv[arg] = NULL;
479}
480
481static int
482ShellCommand(struct cmdargs const *arg, int bg)
483{
484  const char *shell;
485  pid_t shpid, pid;
486
487#ifdef SHELL_ONLY_INTERACTIVELY
488  /* we're only allowed to shell when we run ppp interactively */
489  if (arg->prompt && arg->prompt->owner) {
490    log_Printf(LogWARN, "Can't start a shell from a network connection\n");
491    return 1;
492  }
493#endif
494
495  if (arg->argc == arg->argn) {
496    if (!arg->prompt) {
497      log_Printf(LogWARN, "Can't start an interactive shell from"
498                " a config file\n");
499      return 1;
500    } else if (arg->prompt->owner) {
501      log_Printf(LogWARN, "Can't start an interactive shell from"
502                " a socket connection\n");
503      return 1;
504    } else if (bg) {
505      log_Printf(LogWARN, "Can only start an interactive shell in"
506		" the foreground mode\n");
507      return 1;
508    }
509  }
510
511  pid = getpid();
512  if ((shpid = fork()) == 0) {
513    int i, fd;
514
515    if ((shell = getenv("SHELL")) == 0)
516      shell = _PATH_BSHELL;
517
518    timer_TermService();
519
520    if (arg->prompt)
521      fd = arg->prompt->fd_out;
522    else if ((fd = open(_PATH_DEVNULL, O_RDWR)) == -1) {
523      log_Printf(LogALERT, "Failed to open %s: %s\n",
524                _PATH_DEVNULL, strerror(errno));
525      exit(1);
526    }
527    dup2(fd, STDIN_FILENO);
528    dup2(fd, STDOUT_FILENO);
529    dup2(fd, STDERR_FILENO);
530    for (i = getdtablesize(); i > STDERR_FILENO; i--)
531      fcntl(i, F_SETFD, 1);
532
533#ifndef NOSUID
534    setuid(ID0realuid());
535#endif
536    if (arg->argc > arg->argn) {
537      /* substitute pseudo args */
538      char *argv[MAXARGS];
539      int argc = arg->argc - arg->argn;
540
541      if (argc >= sizeof argv / sizeof argv[0]) {
542        argc = sizeof argv / sizeof argv[0] - 1;
543        log_Printf(LogWARN, "Truncating shell command to %d args\n", argc);
544      }
545      command_Expand(argv, argc, arg->argv + arg->argn, arg->bundle, 0, pid);
546      if (bg) {
547	pid_t p;
548
549	p = getpid();
550	if (daemon(1, 1) == -1) {
551	  log_Printf(LogERROR, "%d: daemon: %s\n", (int)p, strerror(errno));
552	  exit(1);
553	}
554      } else if (arg->prompt)
555        printf("ppp: Pausing until %s finishes\n", arg->argv[arg->argn]);
556      execvp(argv[0], argv);
557    } else {
558      if (arg->prompt)
559        printf("ppp: Pausing until %s finishes\n", shell);
560      prompt_TtyOldMode(arg->prompt);
561      execl(shell, shell, NULL);
562    }
563
564    log_Printf(LogWARN, "exec() of %s failed: %s\n",
565              arg->argc > arg->argn ? arg->argv[arg->argn] : shell,
566              strerror(errno));
567    _exit(255);
568  }
569
570  if (shpid == (pid_t) - 1)
571    log_Printf(LogERROR, "Fork failed: %s\n", strerror(errno));
572  else {
573    int status;
574    waitpid(shpid, &status, 0);
575  }
576
577  if (arg->prompt && !arg->prompt->owner)
578    prompt_TtyCommandMode(arg->prompt);
579
580  return 0;
581}
582
583static int
584BgShellCommand(struct cmdargs const *arg)
585{
586  if (arg->argc == arg->argn)
587    return -1;
588  return ShellCommand(arg, 1);
589}
590
591static int
592FgShellCommand(struct cmdargs const *arg)
593{
594  return ShellCommand(arg, 0);
595}
596
597static int
598ResolvCommand(struct cmdargs const *arg)
599{
600  if (arg->argc == arg->argn + 1) {
601    if (!strcasecmp(arg->argv[arg->argn], "reload"))
602      ipcp_LoadDNS(&arg->bundle->ncp.ipcp);
603    else if (!strcasecmp(arg->argv[arg->argn], "restore"))
604      ipcp_RestoreDNS(&arg->bundle->ncp.ipcp);
605    else if (!strcasecmp(arg->argv[arg->argn], "rewrite"))
606      ipcp_WriteDNS(&arg->bundle->ncp.ipcp);
607    else if (!strcasecmp(arg->argv[arg->argn], "readonly"))
608      arg->bundle->ncp.ipcp.ns.writable = 0;
609    else if (!strcasecmp(arg->argv[arg->argn], "writable"))
610      arg->bundle->ncp.ipcp.ns.writable = 1;
611    else
612      return -1;
613
614    return 0;
615  }
616
617  return -1;
618}
619
620#ifndef NONAT
621static struct cmdtab const NatCommands[] =
622{
623  {"addr", NULL, nat_RedirectAddr, LOCAL_AUTH,
624   "static address translation", "nat addr [addr_local addr_alias]"},
625  {"deny_incoming", NULL, NatOption, LOCAL_AUTH,
626   "stop incoming connections", "nat deny_incoming yes|no",
627   (const void *) PKT_ALIAS_DENY_INCOMING},
628  {"enable", NULL, NatEnable, LOCAL_AUTH,
629   "enable NAT", "nat enable yes|no"},
630  {"log", NULL, NatOption, LOCAL_AUTH,
631   "log NAT link creation", "nat log yes|no",
632   (const void *) PKT_ALIAS_LOG},
633  {"port", NULL, nat_RedirectPort, LOCAL_AUTH, "port redirection",
634   "nat port proto localaddr:port[-port] aliasport[-aliasport]"},
635  {"proxy", NULL, nat_ProxyRule, LOCAL_AUTH,
636   "proxy control", "nat proxy server host[:port] ..."},
637  {"same_ports", NULL, NatOption, LOCAL_AUTH,
638   "try to leave port numbers unchanged", "nat same_ports yes|no",
639   (const void *) PKT_ALIAS_SAME_PORTS},
640  {"target", NULL, nat_SetTarget, LOCAL_AUTH,
641   "Default address for incoming connections", "nat target addr" },
642  {"unregistered_only", NULL, NatOption, LOCAL_AUTH,
643   "translate unregistered (private) IP address space only",
644   "nat unregistered_only yes|no",
645   (const void *) PKT_ALIAS_UNREGISTERED_ONLY},
646  {"use_sockets", NULL, NatOption, LOCAL_AUTH,
647   "allocate host sockets", "nat use_sockets yes|no",
648   (const void *) PKT_ALIAS_USE_SOCKETS},
649  {"help", "?", HelpCommand, LOCAL_AUTH | LOCAL_NO_AUTH,
650   "Display this message", "nat help|? [command]", NatCommands},
651  {NULL, NULL, NULL},
652};
653#endif
654
655static struct cmdtab const AllowCommands[] = {
656  {"modes", "mode", AllowModes, LOCAL_AUTH,
657  "Only allow certain ppp modes", "allow modes mode..."},
658  {"users", "user", AllowUsers, LOCAL_AUTH,
659  "Only allow ppp access to certain users", "allow users logname..."},
660  {"help", "?", HelpCommand, LOCAL_AUTH | LOCAL_NO_AUTH,
661  "Display this message", "allow help|? [command]", AllowCommands},
662  {NULL, NULL, NULL},
663};
664
665static struct cmdtab const IfaceCommands[] =
666{
667  {"add", NULL, IfaceAddCommand, LOCAL_AUTH,
668   "Add iface address", "iface add addr[/bits| mask] peer", NULL},
669  {NULL, "add!", IfaceAddCommand, LOCAL_AUTH,
670   "Add or change an iface address", "iface add! addr[/bits| mask] peer",
671   (void *)1},
672  {"clear", NULL, IfaceClearCommand, LOCAL_AUTH,
673   "Clear iface address(es)", "iface clear"},
674  {"delete", "rm", IfaceDeleteCommand, LOCAL_AUTH,
675   "Delete iface address", "iface delete addr", NULL},
676  {NULL, "rm!", IfaceDeleteCommand, LOCAL_AUTH,
677   "Delete iface address", "iface delete addr", (void *)1},
678  {NULL, "delete!", IfaceDeleteCommand, LOCAL_AUTH,
679   "Delete iface address", "iface delete addr", (void *)1},
680  {"show", NULL, iface_Show, LOCAL_AUTH,
681   "Show iface address(es)", "iface show"},
682  {"help", "?", HelpCommand, LOCAL_AUTH | LOCAL_NO_AUTH,
683   "Display this message", "nat help|? [command]", IfaceCommands},
684  {NULL, NULL, NULL},
685};
686
687static struct cmdtab const Commands[] = {
688  {"accept", NULL, NegotiateCommand, LOCAL_AUTH | LOCAL_CX_OPT,
689  "accept option request", "accept option .."},
690  {"add", NULL, AddCommand, LOCAL_AUTH,
691  "add route", "add dest mask gateway", NULL},
692  {NULL, "add!", AddCommand, LOCAL_AUTH,
693  "add or change route", "add! dest mask gateway", (void *)1},
694  {"allow", "auth", RunListCommand, LOCAL_AUTH,
695  "Allow ppp access", "allow users|modes ....", AllowCommands},
696  {"bg", "!bg", BgShellCommand, LOCAL_AUTH,
697  "Run a background command", "[!]bg command"},
698  {"clear", NULL, ClearCommand, LOCAL_AUTH | LOCAL_CX_OPT,
699  "Clear throughput statistics",
700  "clear ipcp|physical [current|overall|peak]..."},
701  {"clone", NULL, CloneCommand, LOCAL_AUTH | LOCAL_CX,
702  "Clone a link", "clone newname..."},
703  {"close", NULL, CloseCommand, LOCAL_AUTH | LOCAL_CX_OPT,
704  "Close an FSM", "close [lcp|ccp]"},
705  {"delete", NULL, DeleteCommand, LOCAL_AUTH,
706  "delete route", "delete dest", NULL},
707  {NULL, "delete!", DeleteCommand, LOCAL_AUTH,
708  "delete a route if it exists", "delete! dest", (void *)1},
709  {"deny", NULL, NegotiateCommand, LOCAL_AUTH | LOCAL_CX_OPT,
710  "Deny option request", "deny option .."},
711  {"dial", "call", DialCommand, LOCAL_AUTH | LOCAL_CX_OPT,
712  "Dial and login", "dial|call [system ...]", NULL},
713  {"disable", NULL, NegotiateCommand, LOCAL_AUTH | LOCAL_CX_OPT,
714  "Disable option", "disable option .."},
715  {"down", NULL, DownCommand, LOCAL_AUTH | LOCAL_CX_OPT,
716  "Generate a down event", "down [ccp|lcp]"},
717  {"enable", NULL, NegotiateCommand, LOCAL_AUTH | LOCAL_CX_OPT,
718  "Enable option", "enable option .."},
719  {"ident", NULL, IdentCommand, LOCAL_AUTH | LOCAL_CX,
720  "Set the link identity", "ident text..."},
721  {"iface", "interface", RunListCommand, LOCAL_AUTH,
722  "interface control", "iface option ...", IfaceCommands},
723  {"link", "datalink", LinkCommand, LOCAL_AUTH,
724  "Link specific commands", "link name command ..."},
725  {"load", NULL, LoadCommand, LOCAL_AUTH | LOCAL_CX_OPT,
726  "Load settings", "load [system ...]"},
727#ifndef NONAT
728  {"nat", "alias", RunListCommand, LOCAL_AUTH,
729  "NAT control", "nat option yes|no", NatCommands},
730#endif
731  {"open", NULL, OpenCommand, LOCAL_AUTH | LOCAL_CX_OPT,
732  "Open an FSM", "open! [lcp|ccp|ipcp]", (void *)1},
733  {"passwd", NULL, PasswdCommand, LOCAL_NO_AUTH,
734  "Password for manipulation", "passwd LocalPassword"},
735  {"quit", "bye", QuitCommand, LOCAL_AUTH | LOCAL_NO_AUTH,
736  "Quit PPP program", "quit|bye [all]"},
737  {"remove", "rm", RemoveCommand, LOCAL_AUTH | LOCAL_CX,
738  "Remove a link", "remove"},
739  {"rename", "mv", RenameCommand, LOCAL_AUTH | LOCAL_CX,
740  "Rename a link", "rename name"},
741  {"resolv", NULL, ResolvCommand, LOCAL_AUTH,
742  "Manipulate resolv.conf", "resolv readonly|reload|restore|rewrite|writable"},
743  {"save", NULL, SaveCommand, LOCAL_AUTH,
744  "Save settings", "save"},
745  {"sendident", NULL, SendIdentification, LOCAL_AUTH | LOCAL_CX,
746  "Transmit the link identity", "sendident"},
747  {"set", "setup", SetCommand, LOCAL_AUTH | LOCAL_CX_OPT,
748  "Set parameters", "set[up] var value"},
749  {"shell", "!", FgShellCommand, LOCAL_AUTH,
750  "Run a subshell", "shell|! [sh command]"},
751  {"show", NULL, ShowCommand, LOCAL_AUTH | LOCAL_CX_OPT,
752  "Show status and stats", "show var"},
753  {"term", NULL, TerminalCommand, LOCAL_AUTH | LOCAL_CX,
754  "Enter terminal mode", "term"},
755  {"help", "?", HelpCommand, LOCAL_AUTH | LOCAL_NO_AUTH,
756  "Display this message", "help|? [command]", Commands},
757  {NULL, NULL, NULL},
758};
759
760static int
761ShowEscape(struct cmdargs const *arg)
762{
763  if (arg->cx->physical->async.cfg.EscMap[32]) {
764    int code, bit;
765    const char *sep = "";
766
767    for (code = 0; code < 32; code++)
768      if (arg->cx->physical->async.cfg.EscMap[code])
769	for (bit = 0; bit < 8; bit++)
770	  if (arg->cx->physical->async.cfg.EscMap[code] & (1 << bit)) {
771	    prompt_Printf(arg->prompt, "%s0x%02x", sep, (code << 3) + bit);
772            sep = ", ";
773          }
774    prompt_Printf(arg->prompt, "\n");
775  }
776  return 0;
777}
778
779static int
780ShowTimerList(struct cmdargs const *arg)
781{
782  timer_Show(0, arg->prompt);
783  return 0;
784}
785
786static int
787ShowStopped(struct cmdargs const *arg)
788{
789  prompt_Printf(arg->prompt, " Stopped Timer:  LCP: ");
790  if (!arg->cx->physical->link.lcp.fsm.StoppedTimer.load)
791    prompt_Printf(arg->prompt, "Disabled");
792  else
793    prompt_Printf(arg->prompt, "%ld secs",
794                  arg->cx->physical->link.lcp.fsm.StoppedTimer.load / SECTICKS);
795
796  prompt_Printf(arg->prompt, ", CCP: ");
797  if (!arg->cx->physical->link.ccp.fsm.StoppedTimer.load)
798    prompt_Printf(arg->prompt, "Disabled");
799  else
800    prompt_Printf(arg->prompt, "%ld secs",
801                  arg->cx->physical->link.ccp.fsm.StoppedTimer.load / SECTICKS);
802
803  prompt_Printf(arg->prompt, "\n");
804
805  return 0;
806}
807
808static int
809ShowVersion(struct cmdargs const *arg)
810{
811  prompt_Printf(arg->prompt, "PPP Version %s - %s\n", Version, __DATE__);
812  return 0;
813}
814
815static int
816ShowProtocolStats(struct cmdargs const *arg)
817{
818  struct link *l = command_ChooseLink(arg);
819
820  prompt_Printf(arg->prompt, "%s:\n", l->name);
821  link_ReportProtocolStatus(l, arg->prompt);
822  return 0;
823}
824
825static struct cmdtab const ShowCommands[] = {
826  {"bundle", NULL, bundle_ShowStatus, LOCAL_AUTH,
827  "bundle details", "show bundle"},
828  {"ccp", NULL, ccp_ReportStatus, LOCAL_AUTH | LOCAL_CX_OPT,
829  "CCP status", "show cpp"},
830  {"compress", NULL, sl_Show, LOCAL_AUTH,
831  "VJ compression stats", "show compress"},
832  {"escape", NULL, ShowEscape, LOCAL_AUTH | LOCAL_CX,
833  "escape characters", "show escape"},
834  {"filter", NULL, filter_Show, LOCAL_AUTH,
835  "packet filters", "show filter [in|out|dial|alive]"},
836  {"hdlc", NULL, hdlc_ReportStatus, LOCAL_AUTH | LOCAL_CX,
837  "HDLC errors", "show hdlc"},
838  {"iface", "interface", iface_Show, LOCAL_AUTH,
839  "Interface status", "show iface"},
840  {"ipcp", NULL, ipcp_Show, LOCAL_AUTH,
841  "IPCP status", "show ipcp"},
842  {"layers", NULL, link_ShowLayers, LOCAL_AUTH | LOCAL_CX_OPT,
843  "Protocol layers", "show layers"},
844  {"lcp", NULL, lcp_ReportStatus, LOCAL_AUTH | LOCAL_CX,
845  "LCP status", "show lcp"},
846  {"link", "datalink", datalink_Show, LOCAL_AUTH | LOCAL_CX,
847  "(high-level) link info", "show link"},
848  {"links", NULL, bundle_ShowLinks, LOCAL_AUTH,
849  "available link names", "show links"},
850  {"log", NULL, log_ShowLevel, LOCAL_AUTH,
851  "log levels", "show log"},
852  {"mem", NULL, mbuf_Show, LOCAL_AUTH,
853  "mbuf allocations", "show mem"},
854  {"physical", NULL, physical_ShowStatus, LOCAL_AUTH | LOCAL_CX,
855  "(low-level) link info", "show physical"},
856  {"mp", "multilink", mp_ShowStatus, LOCAL_AUTH,
857  "multilink setup", "show mp"},
858  {"proto", NULL, ShowProtocolStats, LOCAL_AUTH | LOCAL_CX_OPT,
859  "protocol summary", "show proto"},
860  {"route", NULL, route_Show, LOCAL_AUTH,
861  "routing table", "show route"},
862  {"stopped", NULL, ShowStopped, LOCAL_AUTH | LOCAL_CX,
863  "STOPPED timeout", "show stopped"},
864  {"timers", NULL, ShowTimerList, LOCAL_AUTH,
865  "alarm timers", "show timers"},
866  {"version", NULL, ShowVersion, LOCAL_NO_AUTH | LOCAL_AUTH,
867  "version string", "show version"},
868  {"who", NULL, log_ShowWho, LOCAL_AUTH,
869  "client list", "show who"},
870  {"help", "?", HelpCommand, LOCAL_NO_AUTH | LOCAL_AUTH,
871  "Display this message", "show help|? [command]", ShowCommands},
872  {NULL, NULL, NULL},
873};
874
875static struct cmdtab const *
876FindCommand(struct cmdtab const *cmds, const char *str, int *pmatch)
877{
878  int nmatch;
879  int len;
880  struct cmdtab const *found;
881
882  found = NULL;
883  len = strlen(str);
884  nmatch = 0;
885  while (cmds->func) {
886    if (cmds->name && strncasecmp(str, cmds->name, len) == 0) {
887      if (cmds->name[len] == '\0') {
888	*pmatch = 1;
889	return cmds;
890      }
891      nmatch++;
892      found = cmds;
893    } else if (cmds->alias && strncasecmp(str, cmds->alias, len) == 0) {
894      if (cmds->alias[len] == '\0') {
895	*pmatch = 1;
896	return cmds;
897      }
898      nmatch++;
899      found = cmds;
900    }
901    cmds++;
902  }
903  *pmatch = nmatch;
904  return found;
905}
906
907static const char *
908mkPrefix(int argc, char const *const *argv, char *tgt, int sz)
909{
910  int f, tlen, len;
911
912  tlen = 0;
913  for (f = 0; f < argc && tlen < sz - 2; f++) {
914    if (f)
915      tgt[tlen++] = ' ';
916    len = strlen(argv[f]);
917    if (len > sz - tlen - 1)
918      len = sz - tlen - 1;
919    strncpy(tgt+tlen, argv[f], len);
920    tlen += len;
921  }
922  tgt[tlen] = '\0';
923  return tgt;
924}
925
926static int
927FindExec(struct bundle *bundle, struct cmdtab const *cmds, int argc, int argn,
928         char const *const *argv, struct prompt *prompt, struct datalink *cx)
929{
930  struct cmdtab const *cmd;
931  int val = 1;
932  int nmatch;
933  struct cmdargs arg;
934  char prefix[100];
935
936  cmd = FindCommand(cmds, argv[argn], &nmatch);
937  if (nmatch > 1)
938    log_Printf(LogWARN, "%s: Ambiguous command\n",
939              mkPrefix(argn+1, argv, prefix, sizeof prefix));
940  else if (cmd && (!prompt || (cmd->lauth & prompt->auth))) {
941    if ((cmd->lauth & LOCAL_CX) && !cx)
942      /* We've got no context, but we require it */
943      cx = bundle2datalink(bundle, NULL);
944
945    if ((cmd->lauth & LOCAL_CX) && !cx)
946      log_Printf(LogWARN, "%s: No context (use the `link' command)\n",
947                mkPrefix(argn+1, argv, prefix, sizeof prefix));
948    else {
949      if (cx && !(cmd->lauth & (LOCAL_CX|LOCAL_CX_OPT))) {
950        log_Printf(LogWARN, "%s: Redundant context (%s) ignored\n",
951                  mkPrefix(argn+1, argv, prefix, sizeof prefix), cx->name);
952        cx = NULL;
953      }
954      arg.cmdtab = cmds;
955      arg.cmd = cmd;
956      arg.argc = argc;
957      arg.argn = argn+1;
958      arg.argv = argv;
959      arg.bundle = bundle;
960      arg.cx = cx;
961      arg.prompt = prompt;
962      val = (*cmd->func) (&arg);
963    }
964  } else
965    log_Printf(LogWARN, "%s: Invalid command\n",
966              mkPrefix(argn+1, argv, prefix, sizeof prefix));
967
968  if (val == -1)
969    log_Printf(LogWARN, "Usage: %s\n", cmd->syntax);
970  else if (val)
971    log_Printf(LogWARN, "%s: Failed %d\n",
972              mkPrefix(argn+1, argv, prefix, sizeof prefix), val);
973
974  return val;
975}
976
977int
978command_Expand_Interpret(char *buff, int nb, char *argv[MAXARGS], int offset)
979{
980  char buff2[LINE_LEN-offset];
981
982  InterpretArg(buff, buff2);
983  strncpy(buff, buff2, LINE_LEN - offset - 1);
984  buff[LINE_LEN - offset - 1] = '\0';
985
986  return command_Interpret(buff, nb, argv);
987}
988
989int
990command_Interpret(char *buff, int nb, char *argv[MAXARGS])
991{
992  char *cp;
993
994  if (nb > 0) {
995    cp = buff + strcspn(buff, "\r\n");
996    if (cp)
997      *cp = '\0';
998    return MakeArgs(buff, argv, MAXARGS, PARSE_REDUCE);
999  }
1000  return 0;
1001}
1002
1003static int
1004arghidden(int argc, char const *const *argv, int n)
1005{
1006  /* Is arg n of the given command to be hidden from the log ? */
1007
1008  /* set authkey xxxxx */
1009  /* set key xxxxx */
1010  if (n == 2 && !strncasecmp(argv[0], "se", 2) &&
1011      (!strncasecmp(argv[1], "authk", 5) || !strncasecmp(argv[1], "ke", 2)))
1012    return 1;
1013
1014  /* passwd xxxxx */
1015  if (n == 1 && !strncasecmp(argv[0], "p", 1))
1016    return 1;
1017
1018  /* set server port xxxxx .... */
1019  if (n == 3 && !strncasecmp(argv[0], "se", 2) &&
1020      !strncasecmp(argv[1], "se", 2))
1021    return 1;
1022
1023  return 0;
1024}
1025
1026void
1027command_Run(struct bundle *bundle, int argc, char const *const *argv,
1028           struct prompt *prompt, const char *label, struct datalink *cx)
1029{
1030  if (argc > 0) {
1031    if (log_IsKept(LogCOMMAND)) {
1032      char buf[LINE_LEN];
1033      int f, n;
1034
1035      if (label) {
1036        strncpy(buf, label, sizeof buf - 3);
1037        buf[sizeof buf - 3] = '\0';
1038        strcat(buf, ": ");
1039        n = strlen(buf);
1040      } else {
1041        *buf = '\0';
1042        n = 0;
1043      }
1044      buf[sizeof buf - 1] = '\0';	/* In case we run out of room in buf */
1045
1046      for (f = 0; f < argc; f++) {
1047        if (n < sizeof buf - 1 && f)
1048          buf[n++] = ' ';
1049        if (arghidden(argc, argv, f))
1050          strncpy(buf+n, "********", sizeof buf - n - 1);
1051        else
1052          strncpy(buf+n, argv[f], sizeof buf - n - 1);
1053        n += strlen(buf+n);
1054      }
1055      log_Printf(LogCOMMAND, "%s\n", buf);
1056    }
1057    FindExec(bundle, Commands, argc, 0, argv, prompt, cx);
1058  }
1059}
1060
1061int
1062command_Decode(struct bundle *bundle, char *buff, int nb, struct prompt *prompt,
1063              const char *label)
1064{
1065  int argc;
1066  char *argv[MAXARGS];
1067
1068  if ((argc = command_Expand_Interpret(buff, nb, argv, 0)) < 0)
1069    return 0;
1070
1071  command_Run(bundle, argc, (char const *const *)argv, prompt, label, NULL);
1072  return 1;
1073}
1074
1075static int
1076ShowCommand(struct cmdargs const *arg)
1077{
1078  if (!arg->prompt)
1079    log_Printf(LogWARN, "show: Cannot show without a prompt\n");
1080  else if (arg->argc > arg->argn)
1081    FindExec(arg->bundle, ShowCommands, arg->argc, arg->argn, arg->argv,
1082             arg->prompt, arg->cx);
1083  else
1084    prompt_Printf(arg->prompt, "Use ``show ?'' to get a list.\n");
1085
1086  return 0;
1087}
1088
1089static int
1090TerminalCommand(struct cmdargs const *arg)
1091{
1092  if (!arg->prompt) {
1093    log_Printf(LogWARN, "term: Need a prompt\n");
1094    return 1;
1095  }
1096
1097  if (arg->cx->physical->link.lcp.fsm.state > ST_CLOSED) {
1098    prompt_Printf(arg->prompt, "LCP state is [%s]\n",
1099                  State2Nam(arg->cx->physical->link.lcp.fsm.state));
1100    return 1;
1101  }
1102
1103  datalink_Up(arg->cx, 0, 0);
1104  prompt_TtyTermMode(arg->prompt, arg->cx);
1105  return 0;
1106}
1107
1108static int
1109QuitCommand(struct cmdargs const *arg)
1110{
1111  if (!arg->prompt || prompt_IsController(arg->prompt) ||
1112      (arg->argc > arg->argn && !strcasecmp(arg->argv[arg->argn], "all") &&
1113       (arg->prompt->auth & LOCAL_AUTH)))
1114    Cleanup(EX_NORMAL);
1115  if (arg->prompt)
1116    prompt_Destroy(arg->prompt, 1);
1117
1118  return 0;
1119}
1120
1121static int
1122OpenCommand(struct cmdargs const *arg)
1123{
1124  if (arg->argc == arg->argn)
1125    bundle_Open(arg->bundle, arg->cx ? arg->cx->name : NULL, PHYS_ALL, 1);
1126  else if (arg->argc == arg->argn + 1) {
1127    if (!strcasecmp(arg->argv[arg->argn], "lcp")) {
1128      struct datalink *cx = arg->cx ?
1129        arg->cx : bundle2datalink(arg->bundle, NULL);
1130      if (cx) {
1131        if (cx->physical->link.lcp.fsm.state == ST_OPENED)
1132          fsm_Reopen(&cx->physical->link.lcp.fsm);
1133        else
1134          bundle_Open(arg->bundle, cx->name, PHYS_ALL, 1);
1135      } else
1136        log_Printf(LogWARN, "open lcp: You must specify a link\n");
1137    } else if (!strcasecmp(arg->argv[arg->argn], "ccp")) {
1138      struct fsm *fp;
1139
1140      fp = &command_ChooseLink(arg)->ccp.fsm;
1141      if (fp->link->lcp.fsm.state != ST_OPENED)
1142        log_Printf(LogWARN, "open: LCP must be open before opening CCP\n");
1143      else if (fp->state == ST_OPENED)
1144        fsm_Reopen(fp);
1145      else {
1146        fp->open_mode = 0;	/* Not passive any more */
1147        if (fp->state == ST_STOPPED) {
1148          fsm_Down(fp);
1149          fsm_Up(fp);
1150        } else {
1151          fsm_Up(fp);
1152          fsm_Open(fp);
1153        }
1154      }
1155    } else if (!strcasecmp(arg->argv[arg->argn], "ipcp")) {
1156      if (arg->cx)
1157        log_Printf(LogWARN, "open ipcp: You need not specify a link\n");
1158      if (arg->bundle->ncp.ipcp.fsm.state == ST_OPENED)
1159        fsm_Reopen(&arg->bundle->ncp.ipcp.fsm);
1160      else
1161        bundle_Open(arg->bundle, NULL, PHYS_ALL, 1);
1162    } else
1163      return -1;
1164  } else
1165    return -1;
1166
1167  return 0;
1168}
1169
1170static int
1171CloseCommand(struct cmdargs const *arg)
1172{
1173  if (arg->argc == arg->argn)
1174    bundle_Close(arg->bundle, arg->cx ? arg->cx->name : NULL, CLOSE_STAYDOWN);
1175  else if (arg->argc == arg->argn + 1) {
1176    if (!strcasecmp(arg->argv[arg->argn], "lcp"))
1177      bundle_Close(arg->bundle, arg->cx ? arg->cx->name : NULL, CLOSE_LCP);
1178    else if (!strcasecmp(arg->argv[arg->argn], "ccp") ||
1179             !strcasecmp(arg->argv[arg->argn], "ccp!")) {
1180      struct fsm *fp;
1181
1182      fp = &command_ChooseLink(arg)->ccp.fsm;
1183      if (fp->state == ST_OPENED) {
1184        fsm_Close(fp);
1185        if (arg->argv[arg->argn][3] == '!')
1186          fp->open_mode = 0;		/* Stay ST_CLOSED */
1187        else
1188          fp->open_mode = OPEN_PASSIVE;	/* Wait for the peer to start */
1189      }
1190    } else
1191      return -1;
1192  } else
1193    return -1;
1194
1195  return 0;
1196}
1197
1198static int
1199DownCommand(struct cmdargs const *arg)
1200{
1201  if (arg->argc == arg->argn) {
1202      if (arg->cx)
1203        datalink_Down(arg->cx, CLOSE_STAYDOWN);
1204      else
1205        bundle_Down(arg->bundle, CLOSE_STAYDOWN);
1206  } else if (arg->argc == arg->argn + 1) {
1207    if (!strcasecmp(arg->argv[arg->argn], "lcp")) {
1208      if (arg->cx)
1209        datalink_Down(arg->cx, CLOSE_LCP);
1210      else
1211        bundle_Down(arg->bundle, CLOSE_LCP);
1212    } else if (!strcasecmp(arg->argv[arg->argn], "ccp")) {
1213      struct fsm *fp = arg->cx ? &arg->cx->physical->link.ccp.fsm :
1214                                 &arg->bundle->ncp.mp.link.ccp.fsm;
1215      fsm2initial(fp);
1216    } else
1217      return -1;
1218  } else
1219    return -1;
1220
1221  return 0;
1222}
1223
1224static int
1225SetModemSpeed(struct cmdargs const *arg)
1226{
1227  long speed;
1228  char *end;
1229
1230  if (arg->argc > arg->argn && *arg->argv[arg->argn]) {
1231    if (arg->argc > arg->argn+1) {
1232      log_Printf(LogWARN, "SetModemSpeed: Too many arguments\n");
1233      return -1;
1234    }
1235    if (strcasecmp(arg->argv[arg->argn], "sync") == 0) {
1236      physical_SetSync(arg->cx->physical);
1237      return 0;
1238    }
1239    end = NULL;
1240    speed = strtol(arg->argv[arg->argn], &end, 10);
1241    if (*end) {
1242      log_Printf(LogWARN, "SetModemSpeed: Bad argument \"%s\"",
1243                arg->argv[arg->argn]);
1244      return -1;
1245    }
1246    if (physical_SetSpeed(arg->cx->physical, speed))
1247      return 0;
1248    log_Printf(LogWARN, "%s: Invalid speed\n", arg->argv[arg->argn]);
1249  } else
1250    log_Printf(LogWARN, "SetModemSpeed: No speed specified\n");
1251
1252  return -1;
1253}
1254
1255static int
1256SetStoppedTimeout(struct cmdargs const *arg)
1257{
1258  struct link *l = &arg->cx->physical->link;
1259
1260  l->lcp.fsm.StoppedTimer.load = 0;
1261  l->ccp.fsm.StoppedTimer.load = 0;
1262  if (arg->argc <= arg->argn+2) {
1263    if (arg->argc > arg->argn) {
1264      l->lcp.fsm.StoppedTimer.load = atoi(arg->argv[arg->argn]) * SECTICKS;
1265      if (arg->argc > arg->argn+1)
1266        l->ccp.fsm.StoppedTimer.load = atoi(arg->argv[arg->argn+1]) * SECTICKS;
1267    }
1268    return 0;
1269  }
1270  return -1;
1271}
1272
1273static int
1274SetServer(struct cmdargs const *arg)
1275{
1276  int res = -1;
1277
1278  if (arg->argc > arg->argn && arg->argc < arg->argn+4) {
1279    const char *port, *passwd, *mask;
1280    int mlen;
1281
1282    /* What's what ? */
1283    port = arg->argv[arg->argn];
1284    if (arg->argc == arg->argn + 2) {
1285      passwd = arg->argv[arg->argn+1];
1286      mask = NULL;
1287    } else if (arg->argc == arg->argn + 3) {
1288      passwd = arg->argv[arg->argn+1];
1289      mask = arg->argv[arg->argn+2];
1290      mlen = strlen(mask);
1291      if (mlen == 0 || mlen > 4 || strspn(mask, "01234567") != mlen ||
1292          (mlen == 4 && *mask != '0')) {
1293        log_Printf(LogWARN, "%s %s: %s: Invalid mask\n",
1294                   arg->argv[arg->argn - 2], arg->argv[arg->argn - 1], mask);
1295        return -1;
1296      }
1297    } else if (arg->argc != arg->argn + 1)
1298      return -1;
1299    else if (strcasecmp(port, "none") == 0) {
1300      if (server_Clear(arg->bundle))
1301        log_Printf(LogPHASE, "Disabled server socket\n");
1302      return 0;
1303    } else if (strcasecmp(port, "open") == 0) {
1304      switch (server_Reopen(arg->bundle)) {
1305        case SERVER_OK:
1306          return 0;
1307        case SERVER_FAILED:
1308          log_Printf(LogWARN, "Failed to reopen server port\n");
1309          return 1;
1310        case SERVER_UNSET:
1311          log_Printf(LogWARN, "Cannot reopen unset server socket\n");
1312          return 1;
1313        default:
1314          break;
1315      }
1316      return -1;
1317    } else if (strcasecmp(port, "closed") == 0) {
1318      if (server_Close(arg->bundle))
1319        log_Printf(LogPHASE, "Closed server socket\n");
1320      else
1321        log_Printf(LogWARN, "Server socket not open\n");
1322
1323      return 0;
1324    } else
1325      return -1;
1326
1327    strncpy(server.cfg.passwd, passwd, sizeof server.cfg.passwd - 1);
1328    server.cfg.passwd[sizeof server.cfg.passwd - 1] = '\0';
1329
1330    if (*port == '/') {
1331      mode_t imask;
1332      char *ptr, name[LINE_LEN + 12];
1333
1334      if (mask == NULL)
1335        imask = (mode_t)-1;
1336      else for (imask = mlen = 0; mask[mlen]; mlen++)
1337        imask = (imask * 8) + mask[mlen] - '0';
1338
1339      ptr = strstr(port, "%d");
1340      if (ptr) {
1341        snprintf(name, sizeof name, "%.*s%d%s",
1342                 (int)(ptr - port), port, arg->bundle->unit, ptr + 2);
1343        port = name;
1344      }
1345      res = server_LocalOpen(arg->bundle, port, imask);
1346    } else {
1347      int iport, add = 0;
1348
1349      if (mask != NULL)
1350        return -1;
1351
1352      if (*port == '+') {
1353        port++;
1354        add = 1;
1355      }
1356      if (strspn(port, "0123456789") != strlen(port)) {
1357        struct servent *s;
1358
1359        if ((s = getservbyname(port, "tcp")) == NULL) {
1360	  iport = 0;
1361	  log_Printf(LogWARN, "%s: Invalid port or service\n", port);
1362	} else
1363	  iport = ntohs(s->s_port);
1364      } else
1365        iport = atoi(port);
1366
1367      if (iport) {
1368        if (add)
1369          iport += arg->bundle->unit;
1370        res = server_TcpOpen(arg->bundle, iport);
1371      } else
1372        res = -1;
1373    }
1374  }
1375
1376  return res;
1377}
1378
1379static int
1380SetEscape(struct cmdargs const *arg)
1381{
1382  int code;
1383  int argc = arg->argc - arg->argn;
1384  char const *const *argv = arg->argv + arg->argn;
1385
1386  for (code = 0; code < 33; code++)
1387    arg->cx->physical->async.cfg.EscMap[code] = 0;
1388
1389  while (argc-- > 0) {
1390    sscanf(*argv++, "%x", &code);
1391    code &= 0xff;
1392    arg->cx->physical->async.cfg.EscMap[code >> 3] |= (1 << (code & 7));
1393    arg->cx->physical->async.cfg.EscMap[32] = 1;
1394  }
1395  return 0;
1396}
1397
1398static int
1399SetInterfaceAddr(struct cmdargs const *arg)
1400{
1401  struct ipcp *ipcp = &arg->bundle->ncp.ipcp;
1402  const char *hisaddr;
1403
1404  if (arg->argc > arg->argn + 4)
1405    return -1;
1406
1407  hisaddr = NULL;
1408  memset(&ipcp->cfg.my_range, '\0', sizeof ipcp->cfg.my_range);
1409  memset(&ipcp->cfg.peer_range, '\0', sizeof ipcp->cfg.peer_range);
1410  ipcp->cfg.HaveTriggerAddress = 0;
1411  ipcp->cfg.netmask.s_addr = INADDR_ANY;
1412  iplist_reset(&ipcp->cfg.peer_list);
1413
1414  if (arg->argc > arg->argn) {
1415    if (!ParseAddr(ipcp, arg->argv[arg->argn],
1416                   &ipcp->cfg.my_range.ipaddr, &ipcp->cfg.my_range.mask,
1417                   &ipcp->cfg.my_range.width))
1418      return 1;
1419    if (arg->argc > arg->argn+1) {
1420      hisaddr = arg->argv[arg->argn+1];
1421      if (arg->argc > arg->argn+2) {
1422        ipcp->ifmask = ipcp->cfg.netmask = GetIpAddr(arg->argv[arg->argn+2]);
1423	if (arg->argc > arg->argn+3) {
1424	  ipcp->cfg.TriggerAddress = GetIpAddr(arg->argv[arg->argn+3]);
1425	  ipcp->cfg.HaveTriggerAddress = 1;
1426	}
1427      }
1428    }
1429  }
1430
1431  /* 0.0.0.0 means any address (0 bits) */
1432  if (ipcp->cfg.my_range.ipaddr.s_addr == INADDR_ANY) {
1433    ipcp->cfg.my_range.mask.s_addr = INADDR_ANY;
1434    ipcp->cfg.my_range.width = 0;
1435  }
1436  ipcp->my_ip.s_addr = ipcp->cfg.my_range.ipaddr.s_addr;
1437  bundle_AdjustFilters(arg->bundle, &ipcp->my_ip, NULL);
1438
1439  if (hisaddr && !ipcp_UseHisaddr(arg->bundle, hisaddr,
1440                                  arg->bundle->phys_type.all & PHYS_AUTO))
1441    return 4;
1442
1443  return 0;
1444}
1445
1446static int
1447SetRetry(int argc, char const *const *argv, u_int *timeout, u_int *maxreq,
1448          u_int *maxtrm, int def)
1449{
1450  if (argc == 0) {
1451    *timeout = DEF_FSMRETRY;
1452    *maxreq = def;
1453    if (maxtrm != NULL)
1454      *maxtrm = def;
1455  } else {
1456    long l = atol(argv[0]);
1457
1458    if (l < MIN_FSMRETRY) {
1459      log_Printf(LogWARN, "%ld: Invalid FSM retry period - min %d\n",
1460                 l, MIN_FSMRETRY);
1461      return 1;
1462    } else
1463      *timeout = l;
1464
1465    if (argc > 1) {
1466      l = atol(argv[1]);
1467      if (l < 1) {
1468        log_Printf(LogWARN, "%ld: Invalid FSM REQ tries - changed to 1\n", l);
1469        l = 1;
1470      }
1471      *maxreq = l;
1472
1473      if (argc > 2 && maxtrm != NULL) {
1474        l = atol(argv[2]);
1475        if (l < 1) {
1476          log_Printf(LogWARN, "%ld: Invalid FSM TRM tries - changed to 1\n", l);
1477          l = 1;
1478        }
1479        *maxtrm = l;
1480      }
1481    }
1482  }
1483
1484  return 0;
1485}
1486
1487static int
1488SetVariable(struct cmdargs const *arg)
1489{
1490  long long_val, param = (long)arg->cmd->args;
1491  int mode, dummyint, f, first, res;
1492  u_short *change;
1493  const char *argp;
1494  struct datalink *cx = arg->cx;	/* LOCAL_CX uses this */
1495  struct link *l = command_ChooseLink(arg);	/* LOCAL_CX_OPT uses this */
1496  struct in_addr dummyaddr, *addr;
1497
1498  if (arg->argc > arg->argn)
1499    argp = arg->argv[arg->argn];
1500  else
1501    argp = "";
1502
1503  res = 0;
1504
1505  if ((arg->cmd->lauth & LOCAL_CX) && !cx) {
1506    log_Printf(LogWARN, "set %s: No context (use the `link' command)\n",
1507              arg->cmd->name);
1508    return 1;
1509  } else if (cx && !(arg->cmd->lauth & (LOCAL_CX|LOCAL_CX_OPT))) {
1510    log_Printf(LogWARN, "set %s: Redundant context (%s) ignored\n",
1511              arg->cmd->name, cx->name);
1512    cx = NULL;
1513  }
1514
1515  switch (param) {
1516  case VAR_AUTHKEY:
1517    strncpy(arg->bundle->cfg.auth.key, argp,
1518            sizeof arg->bundle->cfg.auth.key - 1);
1519    arg->bundle->cfg.auth.key[sizeof arg->bundle->cfg.auth.key - 1] = '\0';
1520    break;
1521
1522  case VAR_AUTHNAME:
1523    switch (bundle_Phase(arg->bundle)) {
1524      default:
1525        log_Printf(LogWARN, "Altering authname while at phase %s\n",
1526                   bundle_PhaseName(arg->bundle));
1527        /* drop through */
1528      case PHASE_DEAD:
1529      case PHASE_ESTABLISH:
1530        strncpy(arg->bundle->cfg.auth.name, argp,
1531                sizeof arg->bundle->cfg.auth.name - 1);
1532        arg->bundle->cfg.auth.name[sizeof arg->bundle->cfg.auth.name-1] = '\0';
1533        break;
1534    }
1535    break;
1536
1537  case VAR_AUTOLOAD:
1538    if (arg->argc == arg->argn + 3) {
1539      int v1, v2, v3;
1540      char *end;
1541
1542      v1 = strtol(arg->argv[arg->argn], &end, 0);
1543      if (v1 < 0 || *end) {
1544        log_Printf(LogWARN, "autoload: %s: Invalid min percentage\n",
1545                   arg->argv[arg->argn]);
1546        res = 1;
1547        break;
1548      }
1549
1550      v2 = strtol(arg->argv[arg->argn + 1], &end, 0);
1551      if (v2 < 0 || *end) {
1552        log_Printf(LogWARN, "autoload: %s: Invalid max percentage\n",
1553                   arg->argv[arg->argn + 1]);
1554        res = 1;
1555        break;
1556      }
1557      if (v2 < v1) {
1558        v3 = v1;
1559        v1 = v2;
1560        v2 = v3;
1561      }
1562
1563      v3 = strtol(arg->argv[arg->argn + 2], &end, 0);
1564      if (v3 <= 0 || *end) {
1565        log_Printf(LogWARN, "autoload: %s: Invalid throughput period\n",
1566                   arg->argv[arg->argn + 2]);
1567        res = 1;
1568        break;
1569      }
1570
1571      arg->bundle->ncp.mp.cfg.autoload.min = v1;
1572      arg->bundle->ncp.mp.cfg.autoload.max = v2;
1573      arg->bundle->ncp.mp.cfg.autoload.period = v3;
1574      mp_RestartAutoloadTimer(&arg->bundle->ncp.mp);
1575    } else {
1576      log_Printf(LogWARN, "Set autoload requires three arguments\n");
1577      res = 1;
1578    }
1579    break;
1580
1581  case VAR_DIAL:
1582    strncpy(cx->cfg.script.dial, argp, sizeof cx->cfg.script.dial - 1);
1583    cx->cfg.script.dial[sizeof cx->cfg.script.dial - 1] = '\0';
1584    break;
1585
1586  case VAR_LOGIN:
1587    strncpy(cx->cfg.script.login, argp, sizeof cx->cfg.script.login - 1);
1588    cx->cfg.script.login[sizeof cx->cfg.script.login - 1] = '\0';
1589    break;
1590
1591  case VAR_WINSIZE:
1592    if (arg->argc > arg->argn) {
1593      l->ccp.cfg.deflate.out.winsize = atoi(arg->argv[arg->argn]);
1594      if (l->ccp.cfg.deflate.out.winsize < 8 ||
1595          l->ccp.cfg.deflate.out.winsize > 15) {
1596          log_Printf(LogWARN, "%d: Invalid outgoing window size\n",
1597                    l->ccp.cfg.deflate.out.winsize);
1598          l->ccp.cfg.deflate.out.winsize = 15;
1599      }
1600      if (arg->argc > arg->argn+1) {
1601        l->ccp.cfg.deflate.in.winsize = atoi(arg->argv[arg->argn+1]);
1602        if (l->ccp.cfg.deflate.in.winsize < 8 ||
1603            l->ccp.cfg.deflate.in.winsize > 15) {
1604            log_Printf(LogWARN, "%d: Invalid incoming window size\n",
1605                      l->ccp.cfg.deflate.in.winsize);
1606            l->ccp.cfg.deflate.in.winsize = 15;
1607        }
1608      } else
1609        l->ccp.cfg.deflate.in.winsize = 0;
1610    } else {
1611      log_Printf(LogWARN, "No window size specified\n");
1612      res = 1;
1613    }
1614    break;
1615
1616#ifdef HAVE_DES
1617  case VAR_MPPE:
1618    if (arg->argc > arg->argn + 2) {
1619      res = -1;
1620      break;
1621    }
1622
1623    if (arg->argc == arg->argn) {
1624      l->ccp.cfg.mppe.keybits = 0;
1625      l->ccp.cfg.mppe.state = MPPE_ANYSTATE;
1626      l->ccp.cfg.mppe.required = 0;
1627      break;
1628    }
1629
1630    if (!strcmp(argp, "*"))
1631      long_val = 0;
1632    else {
1633      long_val = atol(argp);
1634      if (long_val != 40 && long_val != 56 && long_val != 128) {
1635        log_Printf(LogWARN, "%s: Invalid bits value\n", argp);
1636        res = -1;
1637        break;
1638      }
1639    }
1640
1641    if (arg->argc == arg->argn + 2) {
1642      if (!strcmp(arg->argv[arg->argn + 1], "*"))
1643        l->ccp.cfg.mppe.state = MPPE_ANYSTATE;
1644      else if (!strcasecmp(arg->argv[arg->argn + 1], "stateless"))
1645        l->ccp.cfg.mppe.state = MPPE_STATELESS;
1646      else if (!strcasecmp(arg->argv[arg->argn + 1], "statefull"))
1647        l->ccp.cfg.mppe.state = MPPE_STATEFUL;
1648      else {
1649        log_Printf(LogWARN, "%s: Invalid state value\n",
1650                   arg->argv[arg->argn + 1]);
1651        res = -1;
1652        break;
1653      }
1654    } else
1655      l->ccp.cfg.mppe.state = MPPE_ANYSTATE;
1656    l->ccp.cfg.mppe.keybits = long_val;
1657    l->ccp.cfg.mppe.required = 1;
1658    break;
1659#endif
1660
1661  case VAR_DEVICE:
1662    physical_SetDeviceList(cx->physical, arg->argc - arg->argn,
1663                           arg->argv + arg->argn);
1664    break;
1665
1666  case VAR_ACCMAP:
1667    if (arg->argc > arg->argn) {
1668      u_long ulong_val;
1669      sscanf(argp, "%lx", &ulong_val);
1670      cx->physical->link.lcp.cfg.accmap = (u_int32_t)ulong_val;
1671    } else {
1672      log_Printf(LogWARN, "No accmap specified\n");
1673      res = 1;
1674    }
1675    break;
1676
1677  case VAR_MODE:
1678    mode = Nam2mode(argp);
1679    if (mode == PHYS_NONE || mode == PHYS_ALL) {
1680      log_Printf(LogWARN, "%s: Invalid mode\n", argp);
1681      res = -1;
1682      break;
1683    }
1684    bundle_SetMode(arg->bundle, cx, mode);
1685    break;
1686
1687  case VAR_MRRU:
1688    switch (bundle_Phase(arg->bundle)) {
1689      case PHASE_DEAD:
1690        break;
1691      case PHASE_ESTABLISH:
1692        /* Make sure none of our links are DATALINK_LCP or greater */
1693        if (bundle_HighestState(arg->bundle) >= DATALINK_LCP) {
1694          log_Printf(LogWARN, "mrru: Only changable before LCP negotiations\n");
1695          res = 1;
1696          break;
1697        }
1698        break;
1699      default:
1700        log_Printf(LogWARN, "mrru: Only changable at phase DEAD/ESTABLISH\n");
1701        res = 1;
1702        break;
1703    }
1704    if (res != 0)
1705      break;
1706    long_val = atol(argp);
1707    if (long_val && long_val < MIN_MRU) {
1708      log_Printf(LogWARN, "MRRU %ld: too small - min %d\n", long_val, MIN_MRU);
1709      res = 1;
1710      break;
1711    } else if (long_val > MAX_MRU) {
1712      log_Printf(LogWARN, "MRRU %ld: too big - max %d\n", long_val, MAX_MRU);
1713      res = 1;
1714      break;
1715    } else
1716      arg->bundle->ncp.mp.cfg.mrru = long_val;
1717    break;
1718
1719  case VAR_MRU:
1720    switch(arg->argc - arg->argn) {
1721    case 1:
1722      if (argp[strspn(argp, "0123456789")] != '\0') {
1723        res = -1;
1724        break;
1725      }
1726      /*FALLTHRU*/
1727    case 0:
1728      long_val = atol(argp);
1729      change = &l->lcp.cfg.mru;
1730      if (long_val > l->lcp.cfg.max_mru) {
1731        log_Printf(LogWARN, "MRU %ld: too large - max set to %d\n", long_val,
1732                   l->lcp.cfg.max_mru);
1733        res = 1;
1734        break;
1735      }
1736      break;
1737    case 2:
1738      if (strcasecmp(argp, "max") && strcasecmp(argp, "maximum")) {
1739        res = -1;
1740        break;
1741      }
1742      long_val = atol(arg->argv[arg->argn + 1]);
1743      change = &l->lcp.cfg.max_mru;
1744      if (long_val > MAX_MRU) {
1745        log_Printf(LogWARN, "MRU %ld: too large - maximum is %d\n", long_val,
1746                   MAX_MRU);
1747        res = 1;
1748        break;
1749      }
1750      break;
1751    default:
1752      res = -1;
1753      break;
1754    }
1755    if (res != 0)
1756      break;
1757
1758    if (long_val == 0)
1759      *change = DEF_MRU;
1760    else if (long_val < MIN_MRU) {
1761      log_Printf(LogWARN, "MRU %ld: too small - min %d\n", long_val, MIN_MRU);
1762      res = 1;
1763      break;
1764    } else if (long_val > MAX_MRU) {
1765      log_Printf(LogWARN, "MRU %ld: too big - max %d\n", long_val, MAX_MRU);
1766      res = 1;
1767      break;
1768    } else
1769      *change = long_val;
1770    if (l->lcp.cfg.mru > *change)
1771      l->lcp.cfg.mru = *change;
1772    break;
1773
1774  case VAR_MTU:
1775    switch(arg->argc - arg->argn) {
1776    case 1:
1777      if (argp[strspn(argp, "0123456789")] != '\0') {
1778        res = -1;
1779        break;
1780      }
1781      /*FALLTHRU*/
1782    case 0:
1783      long_val = atol(argp);
1784      change = &l->lcp.cfg.mtu;
1785      if (long_val > l->lcp.cfg.max_mtu) {
1786        log_Printf(LogWARN, "MTU %ld: too large - max set to %d\n", long_val,
1787                   l->lcp.cfg.max_mtu);
1788        res = 1;
1789        break;
1790      }
1791      break;
1792    case 2:
1793      if (strcasecmp(argp, "max") && strcasecmp(argp, "maximum")) {
1794        res = -1;
1795        break;
1796      }
1797      long_val = atol(arg->argv[arg->argn + 1]);
1798      change = &l->lcp.cfg.max_mtu;
1799      if (long_val > MAX_MTU) {
1800        log_Printf(LogWARN, "MTU %ld: too large - maximum is %d\n", long_val,
1801                   MAX_MTU);
1802        res = 1;
1803        break;
1804      }
1805      break;
1806    default:
1807      res = -1;
1808      break;
1809    }
1810
1811    if (res != 0)
1812      break;
1813
1814    if (long_val && long_val < MIN_MTU) {
1815      log_Printf(LogWARN, "MTU %ld: too small - min %d\n", long_val, MIN_MTU);
1816      res = 1;
1817      break;
1818    } else if (long_val > MAX_MTU) {
1819      log_Printf(LogWARN, "MTU %ld: too big - max %d\n", long_val, MAX_MTU);
1820      res = 1;
1821      break;
1822    } else
1823      *change = long_val;
1824    if (l->lcp.cfg.mtu > *change)
1825      l->lcp.cfg.mtu = *change;
1826    break;
1827
1828  case VAR_OPENMODE:
1829    if (strcasecmp(argp, "active") == 0)
1830      cx->physical->link.lcp.cfg.openmode = arg->argc > arg->argn+1 ?
1831        atoi(arg->argv[arg->argn+1]) : 1;
1832    else if (strcasecmp(argp, "passive") == 0)
1833      cx->physical->link.lcp.cfg.openmode = OPEN_PASSIVE;
1834    else {
1835      log_Printf(LogWARN, "%s: Invalid openmode\n", argp);
1836      res = 1;
1837    }
1838    break;
1839
1840  case VAR_PHONE:
1841    strncpy(cx->cfg.phone.list, argp, sizeof cx->cfg.phone.list - 1);
1842    cx->cfg.phone.list[sizeof cx->cfg.phone.list - 1] = '\0';
1843    cx->phone.alt = cx->phone.next = NULL;
1844    break;
1845
1846  case VAR_HANGUP:
1847    strncpy(cx->cfg.script.hangup, argp, sizeof cx->cfg.script.hangup - 1);
1848    cx->cfg.script.hangup[sizeof cx->cfg.script.hangup - 1] = '\0';
1849    break;
1850
1851  case VAR_IFQUEUE:
1852    long_val = atol(argp);
1853    arg->bundle->cfg.ifqueue = long_val < 0 ? 0 : long_val;
1854    break;
1855
1856  case VAR_LOGOUT:
1857    strncpy(cx->cfg.script.logout, argp, sizeof cx->cfg.script.logout - 1);
1858    cx->cfg.script.logout[sizeof cx->cfg.script.logout - 1] = '\0';
1859    break;
1860
1861  case VAR_IDLETIMEOUT:
1862    if (arg->argc > arg->argn+2) {
1863      log_Printf(LogWARN, "Too many idle timeout values\n");
1864      res = 1;
1865    } else if (arg->argc == arg->argn) {
1866      log_Printf(LogWARN, "Too few idle timeout values\n");
1867      res = 1;
1868    } else {
1869      int timeout, min;
1870
1871      timeout = atoi(argp);
1872      min = arg->argc == arg->argn + 2 ? atoi(arg->argv[arg->argn + 1]) : -1;
1873      bundle_SetIdleTimer(arg->bundle, timeout, min);
1874    }
1875    break;
1876
1877  case VAR_LQRPERIOD:
1878    long_val = atol(argp);
1879    if (long_val < MIN_LQRPERIOD) {
1880      log_Printf(LogWARN, "%ld: Invalid lqr period - min %d\n",
1881                 long_val, MIN_LQRPERIOD);
1882      res = 1;
1883    } else
1884      l->lcp.cfg.lqrperiod = long_val;
1885    break;
1886
1887  case VAR_LCPRETRY:
1888    res = SetRetry(arg->argc - arg->argn, arg->argv + arg->argn,
1889                   &cx->physical->link.lcp.cfg.fsm.timeout,
1890                   &cx->physical->link.lcp.cfg.fsm.maxreq,
1891                   &cx->physical->link.lcp.cfg.fsm.maxtrm, DEF_FSMTRIES);
1892    break;
1893
1894  case VAR_CHAPRETRY:
1895    res = SetRetry(arg->argc - arg->argn, arg->argv + arg->argn,
1896                   &cx->chap.auth.cfg.fsm.timeout,
1897                   &cx->chap.auth.cfg.fsm.maxreq, NULL, DEF_FSMAUTHTRIES);
1898    break;
1899
1900  case VAR_PAPRETRY:
1901    res = SetRetry(arg->argc - arg->argn, arg->argv + arg->argn,
1902                   &cx->pap.cfg.fsm.timeout, &cx->pap.cfg.fsm.maxreq,
1903                   NULL, DEF_FSMAUTHTRIES);
1904    break;
1905
1906  case VAR_CCPRETRY:
1907    res = SetRetry(arg->argc - arg->argn, arg->argv + arg->argn,
1908                   &l->ccp.cfg.fsm.timeout, &l->ccp.cfg.fsm.maxreq,
1909                   &l->ccp.cfg.fsm.maxtrm, DEF_FSMTRIES);
1910    break;
1911
1912  case VAR_IPCPRETRY:
1913    res = SetRetry(arg->argc - arg->argn, arg->argv + arg->argn,
1914                   &arg->bundle->ncp.ipcp.cfg.fsm.timeout,
1915                   &arg->bundle->ncp.ipcp.cfg.fsm.maxreq,
1916                   &arg->bundle->ncp.ipcp.cfg.fsm.maxtrm, DEF_FSMTRIES);
1917    break;
1918
1919  case VAR_NBNS:
1920  case VAR_DNS:
1921    if (param == VAR_DNS) {
1922      addr = arg->bundle->ncp.ipcp.cfg.ns.dns;
1923      addr[0].s_addr = addr[1].s_addr = INADDR_NONE;
1924    } else {
1925      addr = arg->bundle->ncp.ipcp.cfg.ns.nbns;
1926      addr[0].s_addr = addr[1].s_addr = INADDR_ANY;
1927    }
1928
1929    if (arg->argc > arg->argn) {
1930      ParseAddr(&arg->bundle->ncp.ipcp, arg->argv[arg->argn],
1931                addr, &dummyaddr, &dummyint);
1932      if (arg->argc > arg->argn+1)
1933        ParseAddr(&arg->bundle->ncp.ipcp, arg->argv[arg->argn + 1],
1934                  addr + 1, &dummyaddr, &dummyint);
1935
1936      if (addr[0].s_addr == INADDR_ANY) {
1937        addr[0].s_addr = addr[1].s_addr;
1938        addr[1].s_addr = INADDR_ANY;
1939      }
1940      if (addr[0].s_addr == INADDR_NONE) {
1941        addr[0].s_addr = addr[1].s_addr;
1942        addr[1].s_addr = INADDR_NONE;
1943      }
1944    }
1945    break;
1946
1947  case VAR_CALLBACK:
1948    cx->cfg.callback.opmask = 0;
1949    for (dummyint = arg->argn; dummyint < arg->argc; dummyint++) {
1950      if (!strcasecmp(arg->argv[dummyint], "auth"))
1951        cx->cfg.callback.opmask |= CALLBACK_BIT(CALLBACK_AUTH);
1952      else if (!strcasecmp(arg->argv[dummyint], "cbcp"))
1953        cx->cfg.callback.opmask |= CALLBACK_BIT(CALLBACK_CBCP);
1954      else if (!strcasecmp(arg->argv[dummyint], "e.164")) {
1955        if (dummyint == arg->argc - 1)
1956          log_Printf(LogWARN, "No E.164 arg (E.164 ignored) !\n");
1957        else {
1958          cx->cfg.callback.opmask |= CALLBACK_BIT(CALLBACK_E164);
1959          strncpy(cx->cfg.callback.msg, arg->argv[++dummyint],
1960                  sizeof cx->cfg.callback.msg - 1);
1961          cx->cfg.callback.msg[sizeof cx->cfg.callback.msg - 1] = '\0';
1962        }
1963      } else if (!strcasecmp(arg->argv[dummyint], "none"))
1964        cx->cfg.callback.opmask |= CALLBACK_BIT(CALLBACK_NONE);
1965      else {
1966        res = -1;
1967        break;
1968      }
1969    }
1970    if (cx->cfg.callback.opmask == CALLBACK_BIT(CALLBACK_NONE))
1971      cx->cfg.callback.opmask = 0;
1972    break;
1973
1974  case VAR_CBCP:
1975    cx->cfg.cbcp.delay = 0;
1976    *cx->cfg.cbcp.phone = '\0';
1977    cx->cfg.cbcp.fsmretry = DEF_FSMRETRY;
1978    if (arg->argc > arg->argn) {
1979      strncpy(cx->cfg.cbcp.phone, arg->argv[arg->argn],
1980              sizeof cx->cfg.cbcp.phone - 1);
1981      cx->cfg.cbcp.phone[sizeof cx->cfg.cbcp.phone - 1] = '\0';
1982      if (arg->argc > arg->argn + 1) {
1983        cx->cfg.cbcp.delay = atoi(arg->argv[arg->argn + 1]);
1984        if (arg->argc > arg->argn + 2) {
1985          long_val = atol(arg->argv[arg->argn + 2]);
1986          if (long_val < MIN_FSMRETRY)
1987            log_Printf(LogWARN, "%ld: Invalid CBCP FSM retry period - min %d\n",
1988                       long_val, MIN_FSMRETRY);
1989          else
1990            cx->cfg.cbcp.fsmretry = long_val;
1991        }
1992      }
1993    }
1994    break;
1995
1996  case VAR_CHOKED:
1997    arg->bundle->cfg.choked.timeout = atoi(argp);
1998    if (arg->bundle->cfg.choked.timeout <= 0)
1999      arg->bundle->cfg.choked.timeout = CHOKED_TIMEOUT;
2000    break;
2001
2002  case VAR_SENDPIPE:
2003    long_val = atol(argp);
2004    arg->bundle->ncp.ipcp.cfg.sendpipe = long_val;
2005    break;
2006
2007  case VAR_RECVPIPE:
2008    long_val = atol(argp);
2009    arg->bundle->ncp.ipcp.cfg.recvpipe = long_val;
2010    break;
2011
2012#ifndef NORADIUS
2013  case VAR_RADIUS:
2014    if (!*argp)
2015      *arg->bundle->radius.cfg.file = '\0';
2016    else if (access(argp, R_OK)) {
2017      log_Printf(LogWARN, "%s: %s\n", argp, strerror(errno));
2018      res = 1;
2019      break;
2020    } else {
2021      strncpy(arg->bundle->radius.cfg.file, argp,
2022              sizeof arg->bundle->radius.cfg.file - 1);
2023      arg->bundle->radius.cfg.file
2024        [sizeof arg->bundle->radius.cfg.file - 1] = '\0';
2025    }
2026    break;
2027#endif
2028
2029  case VAR_CD:
2030    if (*argp) {
2031      if (strcasecmp(argp, "off")) {
2032        long_val = atol(argp);
2033        if (long_val < 0)
2034          long_val = 0;
2035        cx->physical->cfg.cd.delay = long_val;
2036        cx->physical->cfg.cd.necessity = argp[strlen(argp)-1] == '!' ?
2037          CD_REQUIRED : CD_VARIABLE;
2038      } else
2039        cx->physical->cfg.cd.necessity = CD_NOTREQUIRED;
2040    } else {
2041      cx->physical->cfg.cd.delay = 0;
2042      cx->physical->cfg.cd.necessity = CD_DEFAULT;
2043    }
2044    break;
2045
2046  case VAR_PARITY:
2047    if (arg->argc == arg->argn + 1)
2048      res = physical_SetParity(arg->cx->physical, argp);
2049    else {
2050      log_Printf(LogWARN, "Parity value must be odd, even or none\n");
2051      res = 1;
2052    }
2053    break;
2054
2055  case VAR_CRTSCTS:
2056    if (strcasecmp(argp, "on") == 0)
2057      physical_SetRtsCts(arg->cx->physical, 1);
2058    else if (strcasecmp(argp, "off") == 0)
2059      physical_SetRtsCts(arg->cx->physical, 0);
2060    else {
2061      log_Printf(LogWARN, "RTS/CTS value must be on or off\n");
2062      res = 1;
2063    }
2064    break;
2065
2066  case VAR_URGENTPORTS:
2067    if (arg->argn == arg->argc) {
2068      ipcp_SetUrgentTOS(&arg->bundle->ncp.ipcp);
2069      ipcp_ClearUrgentTcpPorts(&arg->bundle->ncp.ipcp);
2070      ipcp_ClearUrgentUdpPorts(&arg->bundle->ncp.ipcp);
2071    } else if (!strcasecmp(arg->argv[arg->argn], "udp")) {
2072      ipcp_SetUrgentTOS(&arg->bundle->ncp.ipcp);
2073      if (arg->argn == arg->argc - 1)
2074        ipcp_ClearUrgentUdpPorts(&arg->bundle->ncp.ipcp);
2075      else for (f = arg->argn + 1; f < arg->argc; f++)
2076        if (*arg->argv[f] == '+')
2077          ipcp_AddUrgentUdpPort(&arg->bundle->ncp.ipcp, atoi(arg->argv[f] + 1));
2078        else if (*arg->argv[f] == '-')
2079          ipcp_RemoveUrgentUdpPort(&arg->bundle->ncp.ipcp,
2080                                   atoi(arg->argv[f] + 1));
2081        else {
2082          if (f == arg->argn)
2083            ipcp_ClearUrgentUdpPorts(&arg->bundle->ncp.ipcp);
2084          ipcp_AddUrgentUdpPort(&arg->bundle->ncp.ipcp, atoi(arg->argv[f]));
2085        }
2086    } else if (arg->argn == arg->argc - 1 &&
2087               !strcasecmp(arg->argv[arg->argn], "none")) {
2088      ipcp_ClearUrgentTcpPorts(&arg->bundle->ncp.ipcp);
2089      ipcp_ClearUrgentUdpPorts(&arg->bundle->ncp.ipcp);
2090      ipcp_ClearUrgentTOS(&arg->bundle->ncp.ipcp);
2091    } else {
2092      ipcp_SetUrgentTOS(&arg->bundle->ncp.ipcp);
2093      first = arg->argn;
2094      if (!strcasecmp(arg->argv[first], "tcp") && ++first == arg->argc)
2095        ipcp_ClearUrgentTcpPorts(&arg->bundle->ncp.ipcp);
2096
2097      for (f = first; f < arg->argc; f++)
2098        if (*arg->argv[f] == '+')
2099          ipcp_AddUrgentTcpPort(&arg->bundle->ncp.ipcp, atoi(arg->argv[f] + 1));
2100        else if (*arg->argv[f] == '-')
2101          ipcp_RemoveUrgentTcpPort(&arg->bundle->ncp.ipcp,
2102                                   atoi(arg->argv[f] + 1));
2103        else {
2104          if (f == first)
2105            ipcp_ClearUrgentTcpPorts(&arg->bundle->ncp.ipcp);
2106          ipcp_AddUrgentTcpPort(&arg->bundle->ncp.ipcp, atoi(arg->argv[f]));
2107        }
2108    }
2109    break;
2110  }
2111
2112  return res;
2113}
2114
2115static struct cmdtab const SetCommands[] = {
2116  {"accmap", NULL, SetVariable, LOCAL_AUTH | LOCAL_CX,
2117  "accmap value", "set accmap hex-value", (const void *)VAR_ACCMAP},
2118  {"authkey", "key", SetVariable, LOCAL_AUTH,
2119  "authentication key", "set authkey|key key", (const void *)VAR_AUTHKEY},
2120  {"authname", NULL, SetVariable, LOCAL_AUTH,
2121  "authentication name", "set authname name", (const void *)VAR_AUTHNAME},
2122  {"autoload", NULL, SetVariable, LOCAL_AUTH,
2123  "auto link [de]activation", "set autoload maxtime maxload mintime minload",
2124  (const void *)VAR_AUTOLOAD},
2125  {"bandwidth", NULL, mp_SetDatalinkBandwidth, LOCAL_AUTH | LOCAL_CX,
2126  "datalink bandwidth", "set bandwidth value"},
2127  {"callback", NULL, SetVariable, LOCAL_AUTH | LOCAL_CX,
2128  "callback control", "set callback [none|auth|cbcp|"
2129  "E.164 *|number[,number]...]...", (const void *)VAR_CALLBACK},
2130  {"cbcp", NULL, SetVariable, LOCAL_AUTH | LOCAL_CX,
2131  "CBCP control", "set cbcp [*|phone[,phone...] [delay [timeout]]]",
2132  (const void *)VAR_CBCP},
2133  {"ccpretry", "ccpretries", SetVariable, LOCAL_AUTH | LOCAL_CX_OPT,
2134   "CCP retries", "set ccpretry value [attempts]", (const void *)VAR_CCPRETRY},
2135  {"cd", NULL, SetVariable, LOCAL_AUTH | LOCAL_CX, "Carrier delay requirement",
2136   "set cd value[!]", (const void *)VAR_CD},
2137  {"chapretry", "chapretries", SetVariable, LOCAL_AUTH | LOCAL_CX,
2138   "CHAP retries", "set chapretry value [attempts]",
2139   (const void *)VAR_CHAPRETRY},
2140  {"choked", NULL, SetVariable, LOCAL_AUTH,
2141  "choked timeout", "set choked [secs]", (const void *)VAR_CHOKED},
2142  {"ctsrts", "crtscts", SetVariable, LOCAL_AUTH | LOCAL_CX,
2143   "Use hardware flow control", "set ctsrts [on|off]",
2144   (const char *)VAR_CRTSCTS},
2145  {"deflate", NULL, SetVariable, LOCAL_AUTH | LOCAL_CX_OPT,
2146  "deflate window sizes", "set deflate out-winsize in-winsize",
2147  (const void *) VAR_WINSIZE},
2148#ifdef HAVE_DES
2149  {"mppe", NULL, SetVariable, LOCAL_AUTH | LOCAL_CX_OPT,
2150  "MPPE key size and state", "set mppe [40|56|128|* [statefull|stateless|*]]",
2151  (const void *) VAR_MPPE},
2152#endif
2153  {"device", "line", SetVariable, LOCAL_AUTH | LOCAL_CX,
2154  "physical device name", "set device|line device-name[,device-name]",
2155  (const void *) VAR_DEVICE},
2156  {"dial", NULL, SetVariable, LOCAL_AUTH | LOCAL_CX,
2157  "dialing script", "set dial chat-script", (const void *) VAR_DIAL},
2158  {"dns", NULL, SetVariable, LOCAL_AUTH, "Domain Name Server",
2159  "set dns pri-addr [sec-addr]", (const void *)VAR_DNS},
2160  {"enddisc", NULL, mp_SetEnddisc, LOCAL_AUTH,
2161  "Endpoint Discriminator", "set enddisc [IP|magic|label|psn value]"},
2162  {"escape", NULL, SetEscape, LOCAL_AUTH | LOCAL_CX,
2163  "escape characters", "set escape hex-digit ..."},
2164  {"filter", NULL, filter_Set, LOCAL_AUTH,
2165  "packet filters", "set filter alive|dial|in|out rule-no permit|deny "
2166  "[src_addr[/width]] [dst_addr[/width]] [tcp|udp|icmp|ospf|igmp "
2167  "[src [lt|eq|gt port]] [dst [lt|eq|gt port]] [estab] [syn] [finrst]]"},
2168  {"hangup", NULL, SetVariable, LOCAL_AUTH | LOCAL_CX,
2169  "hangup script", "set hangup chat-script", (const void *) VAR_HANGUP},
2170  {"ifaddr", NULL, SetInterfaceAddr, LOCAL_AUTH, "destination address",
2171  "set ifaddr [src-addr [dst-addr [netmask [trg-addr]]]]"},
2172  {"ifqueue", NULL, SetVariable, LOCAL_AUTH, "interface queue",
2173  "set ifqueue packets", (const void *)VAR_IFQUEUE},
2174  {"ipcpretry", "ipcpretries", SetVariable, LOCAL_AUTH, "IPCP retries",
2175   "set ipcpretry value [attempts]", (const void *)VAR_IPCPRETRY},
2176  {"lcpretry", "lcpretries", SetVariable, LOCAL_AUTH | LOCAL_CX, "LCP retries",
2177   "set lcpretry value [attempts]", (const void *)VAR_LCPRETRY},
2178  {"log", NULL, log_SetLevel, LOCAL_AUTH, "log level",
2179  "set log [local] [+|-]all|async|cbcp|ccp|chat|command|connect|debug|dns|hdlc|"
2180  "id0|ipcp|lcp|lqm|phase|physical|sync|tcp/ip|timer|tun..."},
2181  {"login", NULL, SetVariable, LOCAL_AUTH | LOCAL_CX,
2182  "login script", "set login chat-script", (const void *) VAR_LOGIN},
2183  {"logout", NULL, SetVariable, LOCAL_AUTH | LOCAL_CX,
2184  "logout script", "set logout chat-script", (const void *) VAR_LOGOUT},
2185  {"lqrperiod", NULL, SetVariable, LOCAL_AUTH | LOCAL_CX_OPT,
2186  "LQR period", "set lqrperiod value", (const void *)VAR_LQRPERIOD},
2187  {"mode", NULL, SetVariable, LOCAL_AUTH | LOCAL_CX, "mode value",
2188  "set mode interactive|auto|ddial|background", (const void *)VAR_MODE},
2189  {"mrru", NULL, SetVariable, LOCAL_AUTH, "MRRU value",
2190  "set mrru value", (const void *)VAR_MRRU},
2191  {"mru", NULL, SetVariable, LOCAL_AUTH | LOCAL_CX_OPT,
2192  "MRU value", "set mru [max[imum]] [value]", (const void *)VAR_MRU},
2193  {"mtu", NULL, SetVariable, LOCAL_AUTH | LOCAL_CX,
2194  "interface MTU value", "set mtu [max[imum]] [value]", (const void *)VAR_MTU},
2195  {"nbns", NULL, SetVariable, LOCAL_AUTH, "NetBIOS Name Server",
2196  "set nbns pri-addr [sec-addr]", (const void *)VAR_NBNS},
2197  {"openmode", NULL, SetVariable, LOCAL_AUTH | LOCAL_CX, "open mode",
2198  "set openmode active|passive [secs]", (const void *)VAR_OPENMODE},
2199  {"papretry", "papretries", SetVariable, LOCAL_AUTH | LOCAL_CX, "PAP retries",
2200   "set papretry value [attempts]", (const void *)VAR_PAPRETRY},
2201  {"parity", NULL, SetVariable, LOCAL_AUTH | LOCAL_CX, "serial parity",
2202   "set parity [odd|even|none]", (const void *)VAR_PARITY},
2203  {"phone", NULL, SetVariable, LOCAL_AUTH | LOCAL_CX, "telephone number(s)",
2204  "set phone phone1[:phone2[...]]", (const void *)VAR_PHONE},
2205  {"proctitle", "title", SetProcTitle, LOCAL_AUTH,
2206  "Process title", "set proctitle [value]"},
2207#ifndef NORADIUS
2208  {"radius", NULL, SetVariable, LOCAL_AUTH,
2209  "RADIUS Config", "set radius cfgfile", (const void *)VAR_RADIUS},
2210#endif
2211  {"reconnect", NULL, datalink_SetReconnect, LOCAL_AUTH | LOCAL_CX,
2212  "Reconnect timeout", "set reconnect value ntries"},
2213  {"recvpipe", NULL, SetVariable, LOCAL_AUTH,
2214  "RECVPIPE value", "set recvpipe value", (const void *)VAR_RECVPIPE},
2215  {"redial", NULL, datalink_SetRedial, LOCAL_AUTH | LOCAL_CX,
2216  "Redial timeout", "set redial secs[+inc[-incmax]][.next] [attempts]"},
2217  {"sendpipe", NULL, SetVariable, LOCAL_AUTH,
2218  "SENDPIPE value", "set sendpipe value", (const void *)VAR_SENDPIPE},
2219  {"server", "socket", SetServer, LOCAL_AUTH, "diagnostic port",
2220  "set server|socket TcpPort|LocalName|none|open|closed [password [mask]]"},
2221  {"speed", NULL, SetModemSpeed, LOCAL_AUTH | LOCAL_CX,
2222  "physical speed", "set speed value|sync"},
2223  {"stopped", NULL, SetStoppedTimeout, LOCAL_AUTH | LOCAL_CX,
2224  "STOPPED timeouts", "set stopped [LCPseconds [CCPseconds]]"},
2225  {"timeout", NULL, SetVariable, LOCAL_AUTH, "Idle timeout",
2226  "set timeout idletime", (const void *)VAR_IDLETIMEOUT},
2227  {"urgent", NULL, SetVariable, LOCAL_AUTH, "urgent ports",
2228  "set urgent [tcp|udp] [+|-]port...", (const void *)VAR_URGENTPORTS},
2229  {"vj", NULL, ipcp_vjset, LOCAL_AUTH,
2230  "vj values", "set vj slots|slotcomp [value]"},
2231  {"help", "?", HelpCommand, LOCAL_AUTH | LOCAL_NO_AUTH,
2232  "Display this message", "set help|? [command]", SetCommands},
2233  {NULL, NULL, NULL},
2234};
2235
2236static int
2237SetCommand(struct cmdargs const *arg)
2238{
2239  if (arg->argc > arg->argn)
2240    FindExec(arg->bundle, SetCommands, arg->argc, arg->argn, arg->argv,
2241             arg->prompt, arg->cx);
2242  else if (arg->prompt)
2243    prompt_Printf(arg->prompt, "Use `set ?' to get a list or `set ? <var>' for"
2244	          " syntax help.\n");
2245  else
2246    log_Printf(LogWARN, "set command must have arguments\n");
2247
2248  return 0;
2249}
2250
2251static int
2252AddCommand(struct cmdargs const *arg)
2253{
2254  struct in_addr dest, gateway, netmask;
2255  int gw, addrs;
2256
2257  if (arg->argc != arg->argn+3 && arg->argc != arg->argn+2)
2258    return -1;
2259
2260  addrs = 0;
2261  if (arg->argc == arg->argn+2) {
2262    if (!strcasecmp(arg->argv[arg->argn], "default"))
2263      dest.s_addr = netmask.s_addr = INADDR_ANY;
2264    else {
2265      int width;
2266
2267      if (!ParseAddr(&arg->bundle->ncp.ipcp, arg->argv[arg->argn],
2268	             &dest, &netmask, &width))
2269        return -1;
2270      if (!strncasecmp(arg->argv[arg->argn], "MYADDR", 6))
2271        addrs = ROUTE_DSTMYADDR;
2272      else if (!strncasecmp(arg->argv[arg->argn], "HISADDR", 7))
2273        addrs = ROUTE_DSTHISADDR;
2274      else if (!strncasecmp(arg->argv[arg->argn], "DNS0", 4))
2275        addrs = ROUTE_DSTDNS0;
2276      else if (!strncasecmp(arg->argv[arg->argn], "DNS1", 4))
2277        addrs = ROUTE_DSTDNS1;
2278    }
2279    gw = 1;
2280  } else {
2281    if (strcasecmp(arg->argv[arg->argn], "MYADDR") == 0) {
2282      addrs = ROUTE_DSTMYADDR;
2283      dest = arg->bundle->ncp.ipcp.my_ip;
2284    } else if (strcasecmp(arg->argv[arg->argn], "HISADDR") == 0) {
2285      addrs = ROUTE_DSTHISADDR;
2286      dest = arg->bundle->ncp.ipcp.peer_ip;
2287    } else if (strcasecmp(arg->argv[arg->argn], "DNS0") == 0) {
2288      addrs = ROUTE_DSTDNS0;
2289      dest = arg->bundle->ncp.ipcp.ns.dns[0];
2290    } else if (strcasecmp(arg->argv[arg->argn], "DNS1") == 0) {
2291      addrs = ROUTE_DSTDNS1;
2292      dest = arg->bundle->ncp.ipcp.ns.dns[1];
2293    } else {
2294      dest = GetIpAddr(arg->argv[arg->argn]);
2295      if (dest.s_addr == INADDR_NONE) {
2296        log_Printf(LogWARN, "%s: Invalid destination address\n",
2297                   arg->argv[arg->argn]);
2298        return -1;
2299      }
2300    }
2301    netmask = GetIpAddr(arg->argv[arg->argn+1]);
2302    gw = 2;
2303  }
2304
2305  if (strcasecmp(arg->argv[arg->argn+gw], "HISADDR") == 0) {
2306    gateway = arg->bundle->ncp.ipcp.peer_ip;
2307    addrs |= ROUTE_GWHISADDR;
2308  } else {
2309    gateway = GetIpAddr(arg->argv[arg->argn+gw]);
2310    if (gateway.s_addr == INADDR_NONE) {
2311      log_Printf(LogWARN, "%s: Invalid gateway address\n",
2312                 arg->argv[arg->argn + gw]);
2313      return -1;
2314    }
2315  }
2316
2317  if (rt_Set(arg->bundle, RTM_ADD, dest, gateway, netmask,
2318                  arg->cmd->args ? 1 : 0, (addrs & ROUTE_GWHISADDR) ? 1 : 0)
2319      && addrs != ROUTE_STATIC)
2320    route_Add(&arg->bundle->ncp.ipcp.route, addrs, dest, netmask, gateway);
2321
2322  return 0;
2323}
2324
2325static int
2326DeleteCommand(struct cmdargs const *arg)
2327{
2328  struct in_addr dest, none;
2329  int addrs;
2330
2331  if (arg->argc == arg->argn+1) {
2332    if(strcasecmp(arg->argv[arg->argn], "all") == 0) {
2333      route_IfDelete(arg->bundle, 0);
2334      route_DeleteAll(&arg->bundle->ncp.ipcp.route);
2335    } else {
2336      addrs = 0;
2337      if (strcasecmp(arg->argv[arg->argn], "MYADDR") == 0) {
2338        dest = arg->bundle->ncp.ipcp.my_ip;
2339        addrs = ROUTE_DSTMYADDR;
2340      } else if (strcasecmp(arg->argv[arg->argn], "HISADDR") == 0) {
2341        dest = arg->bundle->ncp.ipcp.peer_ip;
2342        addrs = ROUTE_DSTHISADDR;
2343      } else if (strcasecmp(arg->argv[arg->argn], "DNS0") == 0) {
2344        dest = arg->bundle->ncp.ipcp.ns.dns[0];
2345        addrs = ROUTE_DSTDNS0;
2346      } else if (strcasecmp(arg->argv[arg->argn], "DNS1") == 0) {
2347        dest = arg->bundle->ncp.ipcp.ns.dns[1];
2348        addrs = ROUTE_DSTDNS1;
2349      } else {
2350        dest = GetIpAddr(arg->argv[arg->argn]);
2351        if (dest.s_addr == INADDR_NONE) {
2352          log_Printf(LogWARN, "%s: Invalid IP address\n", arg->argv[arg->argn]);
2353          return -1;
2354        }
2355        addrs = ROUTE_STATIC;
2356      }
2357      none.s_addr = INADDR_ANY;
2358      rt_Set(arg->bundle, RTM_DELETE, dest, none, none,
2359                      arg->cmd->args ? 1 : 0, 0);
2360      route_Delete(&arg->bundle->ncp.ipcp.route, addrs, dest);
2361    }
2362  } else
2363    return -1;
2364
2365  return 0;
2366}
2367
2368#ifndef NONAT
2369static int
2370NatEnable(struct cmdargs const *arg)
2371{
2372  if (arg->argc == arg->argn+1) {
2373    if (strcasecmp(arg->argv[arg->argn], "yes") == 0) {
2374      if (!arg->bundle->NatEnabled) {
2375        if (arg->bundle->ncp.ipcp.fsm.state == ST_OPENED)
2376          PacketAliasSetAddress(arg->bundle->ncp.ipcp.my_ip);
2377        arg->bundle->NatEnabled = 1;
2378      }
2379      return 0;
2380    } else if (strcasecmp(arg->argv[arg->argn], "no") == 0) {
2381      arg->bundle->NatEnabled = 0;
2382      arg->bundle->cfg.opt &= ~OPT_IFACEALIAS;
2383      /* Don't iface_Clear() - there may be manually configured addresses */
2384      return 0;
2385    }
2386  }
2387
2388  return -1;
2389}
2390
2391
2392static int
2393NatOption(struct cmdargs const *arg)
2394{
2395  long param = (long)arg->cmd->args;
2396
2397  if (arg->argc == arg->argn+1) {
2398    if (strcasecmp(arg->argv[arg->argn], "yes") == 0) {
2399      if (arg->bundle->NatEnabled) {
2400	PacketAliasSetMode(param, param);
2401	return 0;
2402      }
2403      log_Printf(LogWARN, "nat not enabled\n");
2404    } else if (strcmp(arg->argv[arg->argn], "no") == 0) {
2405      if (arg->bundle->NatEnabled) {
2406	PacketAliasSetMode(0, param);
2407	return 0;
2408      }
2409      log_Printf(LogWARN, "nat not enabled\n");
2410    }
2411  }
2412  return -1;
2413}
2414#endif /* #ifndef NONAT */
2415
2416static int
2417LinkCommand(struct cmdargs const *arg)
2418{
2419  if (arg->argc > arg->argn+1) {
2420    char namelist[LINE_LEN];
2421    struct datalink *cx;
2422    char *name;
2423    int result = 0;
2424
2425    if (!strcmp(arg->argv[arg->argn], "*")) {
2426      struct datalink *dl;
2427
2428      cx = arg->bundle->links;
2429      while (cx) {
2430        /* Watch it, the command could be a ``remove'' */
2431        dl = cx->next;
2432        FindExec(arg->bundle, Commands, arg->argc, arg->argn+1, arg->argv,
2433                 arg->prompt, cx);
2434        for (cx = arg->bundle->links; cx; cx = cx->next)
2435          if (cx == dl)
2436            break;		/* Pointer's still valid ! */
2437      }
2438    } else {
2439      strncpy(namelist, arg->argv[arg->argn], sizeof namelist - 1);
2440      namelist[sizeof namelist - 1] = '\0';
2441      for(name = strtok(namelist, ", "); name; name = strtok(NULL,", "))
2442        if (!bundle2datalink(arg->bundle, name)) {
2443          log_Printf(LogWARN, "link: %s: Invalid link name\n", name);
2444          return 1;
2445        }
2446
2447      strncpy(namelist, arg->argv[arg->argn], sizeof namelist - 1);
2448      namelist[sizeof namelist - 1] = '\0';
2449      for(name = strtok(namelist, ", "); name; name = strtok(NULL,", ")) {
2450        cx = bundle2datalink(arg->bundle, name);
2451        if (cx)
2452          FindExec(arg->bundle, Commands, arg->argc, arg->argn+1, arg->argv,
2453                   arg->prompt, cx);
2454        else {
2455          log_Printf(LogWARN, "link: %s: Invalidated link name !\n", name);
2456          result++;
2457        }
2458      }
2459    }
2460    return result;
2461  }
2462
2463  log_Printf(LogWARN, "Usage: %s\n", arg->cmd->syntax);
2464  return 2;
2465}
2466
2467struct link *
2468command_ChooseLink(struct cmdargs const *arg)
2469{
2470  if (arg->cx)
2471    return &arg->cx->physical->link;
2472  else if (!arg->bundle->ncp.mp.cfg.mrru) {
2473    struct datalink *dl = bundle2datalink(arg->bundle, NULL);
2474    if (dl)
2475      return &dl->physical->link;
2476  }
2477  return &arg->bundle->ncp.mp.link;
2478}
2479
2480static const char *
2481ident_cmd(const char *cmd, unsigned *keep, unsigned *add)
2482{
2483  const char *result;
2484
2485  switch (*cmd) {
2486    case 'A':
2487    case 'a':
2488      result = "accept";
2489      *keep = NEG_MYMASK;
2490      *add = NEG_ACCEPTED;
2491      break;
2492    case 'D':
2493    case 'd':
2494      switch (cmd[1]) {
2495        case 'E':
2496        case 'e':
2497          result = "deny";
2498          *keep = NEG_MYMASK;
2499          *add = 0;
2500          break;
2501        case 'I':
2502        case 'i':
2503          result = "disable";
2504          *keep = NEG_HISMASK;
2505          *add = 0;
2506          break;
2507        default:
2508          return NULL;
2509      }
2510      break;
2511    case 'E':
2512    case 'e':
2513      result = "enable";
2514      *keep = NEG_HISMASK;
2515      *add = NEG_ENABLED;
2516      break;
2517    default:
2518      return NULL;
2519  }
2520
2521  return result;
2522}
2523
2524static int
2525OptSet(struct cmdargs const *arg)
2526{
2527  int bit = (int)(long)arg->cmd->args;
2528  const char *cmd;
2529  unsigned keep;			/* Keep these bits */
2530  unsigned add;				/* Add these bits */
2531
2532  if ((cmd = ident_cmd(arg->argv[arg->argn-2], &keep, &add)) == NULL)
2533    return 1;
2534
2535  if (add)
2536    arg->bundle->cfg.opt |= bit;
2537  else
2538    arg->bundle->cfg.opt &= ~bit;
2539  return 0;
2540}
2541
2542static int
2543IfaceAliasOptSet(struct cmdargs const *arg)
2544{
2545  unsigned save = arg->bundle->cfg.opt;
2546  int result = OptSet(arg);
2547
2548  if (result == 0)
2549    if (Enabled(arg->bundle, OPT_IFACEALIAS) && !arg->bundle->NatEnabled) {
2550      arg->bundle->cfg.opt = save;
2551      log_Printf(LogWARN, "Cannot enable iface-alias without NAT\n");
2552      result = 2;
2553    }
2554
2555  return result;
2556}
2557
2558static int
2559NegotiateSet(struct cmdargs const *arg)
2560{
2561  long param = (long)arg->cmd->args;
2562  struct link *l = command_ChooseLink(arg);	/* LOCAL_CX_OPT uses this */
2563  struct datalink *cx = arg->cx;	/* LOCAL_CX uses this */
2564  const char *cmd;
2565  unsigned keep;			/* Keep these bits */
2566  unsigned add;				/* Add these bits */
2567
2568  if ((cmd = ident_cmd(arg->argv[arg->argn-2], &keep, &add)) == NULL)
2569    return 1;
2570
2571  if ((arg->cmd->lauth & LOCAL_CX) && !cx) {
2572    log_Printf(LogWARN, "%s %s: No context (use the `link' command)\n",
2573              cmd, arg->cmd->name);
2574    return 2;
2575  } else if (cx && !(arg->cmd->lauth & (LOCAL_CX|LOCAL_CX_OPT))) {
2576    log_Printf(LogWARN, "%s %s: Redundant context (%s) ignored\n",
2577              cmd, arg->cmd->name, cx->name);
2578    cx = NULL;
2579  }
2580
2581  switch (param) {
2582    case NEG_ACFCOMP:
2583      cx->physical->link.lcp.cfg.acfcomp &= keep;
2584      cx->physical->link.lcp.cfg.acfcomp |= add;
2585      break;
2586    case NEG_CHAP05:
2587      cx->physical->link.lcp.cfg.chap05 &= keep;
2588      cx->physical->link.lcp.cfg.chap05 |= add;
2589      break;
2590#ifdef HAVE_DES
2591    case NEG_CHAP80:
2592      cx->physical->link.lcp.cfg.chap80nt &= keep;
2593      cx->physical->link.lcp.cfg.chap80nt |= add;
2594      break;
2595    case NEG_CHAP80LM:
2596      cx->physical->link.lcp.cfg.chap80lm &= keep;
2597      cx->physical->link.lcp.cfg.chap80lm |= add;
2598      break;
2599    case NEG_CHAP81:
2600      cx->physical->link.lcp.cfg.chap81 &= keep;
2601      cx->physical->link.lcp.cfg.chap81 |= add;
2602      break;
2603    case NEG_MPPE:
2604      l->ccp.cfg.neg[CCP_NEG_MPPE] &= keep;
2605      l->ccp.cfg.neg[CCP_NEG_MPPE] |= add;
2606      break;
2607#endif
2608    case NEG_DEFLATE:
2609      l->ccp.cfg.neg[CCP_NEG_DEFLATE] &= keep;
2610      l->ccp.cfg.neg[CCP_NEG_DEFLATE] |= add;
2611      break;
2612    case NEG_DNS:
2613      arg->bundle->ncp.ipcp.cfg.ns.dns_neg &= keep;
2614      arg->bundle->ncp.ipcp.cfg.ns.dns_neg |= add;
2615      break;
2616    case NEG_ENDDISC:
2617      arg->bundle->ncp.mp.cfg.negenddisc &= keep;
2618      arg->bundle->ncp.mp.cfg.negenddisc |= add;
2619      break;
2620    case NEG_LQR:
2621      cx->physical->link.lcp.cfg.lqr &= keep;
2622      cx->physical->link.lcp.cfg.lqr |= add;
2623      break;
2624    case NEG_PAP:
2625      cx->physical->link.lcp.cfg.pap &= keep;
2626      cx->physical->link.lcp.cfg.pap |= add;
2627      break;
2628    case NEG_PPPDDEFLATE:
2629      l->ccp.cfg.neg[CCP_NEG_DEFLATE24] &= keep;
2630      l->ccp.cfg.neg[CCP_NEG_DEFLATE24] |= add;
2631      break;
2632    case NEG_PRED1:
2633      l->ccp.cfg.neg[CCP_NEG_PRED1] &= keep;
2634      l->ccp.cfg.neg[CCP_NEG_PRED1] |= add;
2635      break;
2636    case NEG_PROTOCOMP:
2637      cx->physical->link.lcp.cfg.protocomp &= keep;
2638      cx->physical->link.lcp.cfg.protocomp |= add;
2639      break;
2640    case NEG_SHORTSEQ:
2641      switch (bundle_Phase(arg->bundle)) {
2642        case PHASE_DEAD:
2643          break;
2644        case PHASE_ESTABLISH:
2645          /* Make sure none of our links are DATALINK_LCP or greater */
2646          if (bundle_HighestState(arg->bundle) >= DATALINK_LCP) {
2647            log_Printf(LogWARN, "shortseq: Only changable before"
2648                       " LCP negotiations\n");
2649            return 1;
2650          }
2651          break;
2652        default:
2653          log_Printf(LogWARN, "shortseq: Only changable at phase"
2654                     " DEAD/ESTABLISH\n");
2655          return 1;
2656      }
2657      arg->bundle->ncp.mp.cfg.shortseq &= keep;
2658      arg->bundle->ncp.mp.cfg.shortseq |= add;
2659      break;
2660    case NEG_VJCOMP:
2661      arg->bundle->ncp.ipcp.cfg.vj.neg &= keep;
2662      arg->bundle->ncp.ipcp.cfg.vj.neg |= add;
2663      break;
2664  }
2665
2666  return 0;
2667}
2668
2669static struct cmdtab const NegotiateCommands[] = {
2670  {"filter-decapsulation", NULL, OptSet, LOCAL_AUTH,
2671  "filter on PPPoUDP payloads", "disable|enable",
2672  (const void *)OPT_FILTERDECAP},
2673  {"idcheck", NULL, OptSet, LOCAL_AUTH, "Check FSM reply ids",
2674  "disable|enable", (const void *)OPT_IDCHECK},
2675  {"iface-alias", NULL, IfaceAliasOptSet, LOCAL_AUTH,
2676  "retain interface addresses", "disable|enable",
2677  (const void *)OPT_IFACEALIAS},
2678  {"keep-session", NULL, OptSet, LOCAL_AUTH, "Retain device session leader",
2679  "disable|enable", (const void *)OPT_KEEPSESSION},
2680  {"loopback", NULL, OptSet, LOCAL_AUTH, "Loop packets for local iface",
2681  "disable|enable", (const void *)OPT_LOOPBACK},
2682  {"passwdauth", NULL, OptSet, LOCAL_AUTH, "Use passwd file",
2683  "disable|enable", (const void *)OPT_PASSWDAUTH},
2684  {"proxy", NULL, OptSet, LOCAL_AUTH, "Create a proxy ARP entry",
2685  "disable|enable", (const void *)OPT_PROXY},
2686  {"proxyall", NULL, OptSet, LOCAL_AUTH, "Proxy ARP for all remote hosts",
2687  "disable|enable", (const void *)OPT_PROXYALL},
2688  {"sroutes", NULL, OptSet, LOCAL_AUTH, "Use sticky routes",
2689  "disable|enable", (const void *)OPT_SROUTES},
2690  {"tcpmssfixup", "mssfixup", OptSet, LOCAL_AUTH, "Modify MSS options",
2691  "disable|enable", (const void *)OPT_TCPMSSFIXUP},
2692  {"throughput", NULL, OptSet, LOCAL_AUTH, "Rolling throughput",
2693  "disable|enable", (const void *)OPT_THROUGHPUT},
2694  {"utmp", NULL, OptSet, LOCAL_AUTH, "Log connections in utmp",
2695  "disable|enable", (const void *)OPT_UTMP},
2696
2697#define OPT_MAX 11	/* accept/deny allowed below and not above */
2698
2699  {"acfcomp", NULL, NegotiateSet, LOCAL_AUTH | LOCAL_CX,
2700  "Address & Control field compression", "accept|deny|disable|enable",
2701  (const void *)NEG_ACFCOMP},
2702  {"chap", "chap05", NegotiateSet, LOCAL_AUTH | LOCAL_CX,
2703  "Challenge Handshake Authentication Protocol", "accept|deny|disable|enable",
2704  (const void *)NEG_CHAP05},
2705#ifdef HAVE_DES
2706  {"mschap", "chap80nt", NegotiateSet, LOCAL_AUTH | LOCAL_CX,
2707  "Microsoft (NT) CHAP", "accept|deny|disable|enable",
2708  (const void *)NEG_CHAP80},
2709  {"LANMan", "chap80lm", NegotiateSet, LOCAL_AUTH | LOCAL_CX,
2710  "Microsoft (NT) CHAP", "accept|deny|disable|enable",
2711  (const void *)NEG_CHAP80LM},
2712  {"mschapv2", "chap81", NegotiateSet, LOCAL_AUTH | LOCAL_CX,
2713  "Microsoft CHAP v2", "accept|deny|disable|enable",
2714  (const void *)NEG_CHAP81},
2715  {"mppe", NULL, NegotiateSet, LOCAL_AUTH | LOCAL_CX_OPT,
2716  "MPPE encryption", "accept|deny|disable|enable",
2717  (const void *)NEG_MPPE},
2718#endif
2719  {"deflate", NULL, NegotiateSet, LOCAL_AUTH | LOCAL_CX_OPT,
2720  "Deflate compression", "accept|deny|disable|enable",
2721  (const void *)NEG_DEFLATE},
2722  {"deflate24", NULL, NegotiateSet, LOCAL_AUTH | LOCAL_CX_OPT,
2723  "Deflate (type 24) compression", "accept|deny|disable|enable",
2724  (const void *)NEG_PPPDDEFLATE},
2725  {"dns", NULL, NegotiateSet, LOCAL_AUTH,
2726  "DNS specification", "accept|deny|disable|enable", (const void *)NEG_DNS},
2727  {"enddisc", NULL, NegotiateSet, LOCAL_AUTH, "ENDDISC negotiation",
2728  "accept|deny|disable|enable", (const void *)NEG_ENDDISC},
2729  {"lqr", NULL, NegotiateSet, LOCAL_AUTH | LOCAL_CX,
2730  "Link Quality Reports", "accept|deny|disable|enable",
2731  (const void *)NEG_LQR},
2732  {"pap", NULL, NegotiateSet, LOCAL_AUTH | LOCAL_CX,
2733  "Password Authentication protocol", "accept|deny|disable|enable",
2734  (const void *)NEG_PAP},
2735  {"pred1", "predictor1", NegotiateSet, LOCAL_AUTH | LOCAL_CX_OPT,
2736  "Predictor 1 compression", "accept|deny|disable|enable",
2737  (const void *)NEG_PRED1},
2738  {"protocomp", NULL, NegotiateSet, LOCAL_AUTH | LOCAL_CX,
2739  "Protocol field compression", "accept|deny|disable|enable",
2740  (const void *)NEG_PROTOCOMP},
2741  {"shortseq", NULL, NegotiateSet, LOCAL_AUTH,
2742  "MP Short Sequence Numbers", "accept|deny|disable|enable",
2743  (const void *)NEG_SHORTSEQ},
2744  {"vjcomp", NULL, NegotiateSet, LOCAL_AUTH,
2745  "Van Jacobson header compression", "accept|deny|disable|enable",
2746  (const void *)NEG_VJCOMP},
2747  {"help", "?", HelpCommand, LOCAL_AUTH | LOCAL_NO_AUTH,
2748  "Display this message", "accept|deny|disable|enable help|? [value]",
2749  NegotiateCommands},
2750  {NULL, NULL, NULL},
2751};
2752
2753static int
2754NegotiateCommand(struct cmdargs const *arg)
2755{
2756  if (arg->argc > arg->argn) {
2757    char const *argv[3];
2758    unsigned keep, add;
2759    int n;
2760
2761    if ((argv[0] = ident_cmd(arg->argv[arg->argn-1], &keep, &add)) == NULL)
2762      return -1;
2763    argv[2] = NULL;
2764
2765    for (n = arg->argn; n < arg->argc; n++) {
2766      argv[1] = arg->argv[n];
2767      FindExec(arg->bundle, NegotiateCommands + (keep == NEG_HISMASK ?
2768               0 : OPT_MAX), 2, 1, argv, arg->prompt, arg->cx);
2769    }
2770  } else if (arg->prompt)
2771    prompt_Printf(arg->prompt, "Use `%s ?' to get a list.\n",
2772	    arg->argv[arg->argn-1]);
2773  else
2774    log_Printf(LogWARN, "%s command must have arguments\n",
2775              arg->argv[arg->argn] );
2776
2777  return 0;
2778}
2779
2780const char *
2781command_ShowNegval(unsigned val)
2782{
2783  switch (val&3) {
2784    case 1: return "disabled & accepted";
2785    case 2: return "enabled & denied";
2786    case 3: return "enabled & accepted";
2787  }
2788  return "disabled & denied";
2789}
2790
2791static int
2792ClearCommand(struct cmdargs const *arg)
2793{
2794  struct pppThroughput *t;
2795  struct datalink *cx;
2796  int i, clear_type;
2797
2798  if (arg->argc < arg->argn + 1)
2799    return -1;
2800
2801  if (strcasecmp(arg->argv[arg->argn], "physical") == 0) {
2802    cx = arg->cx;
2803    if (!cx)
2804      cx = bundle2datalink(arg->bundle, NULL);
2805    if (!cx) {
2806      log_Printf(LogWARN, "A link must be specified for ``clear physical''\n");
2807      return 1;
2808    }
2809    t = &cx->physical->link.stats.total;
2810  } else if (strcasecmp(arg->argv[arg->argn], "ipcp") == 0)
2811    t = &arg->bundle->ncp.ipcp.throughput;
2812  else
2813    return -1;
2814
2815  if (arg->argc > arg->argn + 1) {
2816    clear_type = 0;
2817    for (i = arg->argn + 1; i < arg->argc; i++)
2818      if (strcasecmp(arg->argv[i], "overall") == 0)
2819        clear_type |= THROUGHPUT_OVERALL;
2820      else if (strcasecmp(arg->argv[i], "current") == 0)
2821        clear_type |= THROUGHPUT_CURRENT;
2822      else if (strcasecmp(arg->argv[i], "peak") == 0)
2823        clear_type |= THROUGHPUT_PEAK;
2824      else
2825        return -1;
2826  } else
2827    clear_type = THROUGHPUT_ALL;
2828
2829  throughput_clear(t, clear_type, arg->prompt);
2830  return 0;
2831}
2832
2833static int
2834RunListCommand(struct cmdargs const *arg)
2835{
2836  const char *cmd = arg->argc ? arg->argv[arg->argc - 1] : "???";
2837
2838#ifndef NONAT
2839  if (arg->cmd->args == NatCommands &&
2840      tolower(*arg->argv[arg->argn - 1]) == 'a') {
2841    if (arg->prompt)
2842      prompt_Printf(arg->prompt, "The alias command is deprecated\n");
2843    else
2844      log_Printf(LogWARN, "The alias command is deprecated\n");
2845  }
2846#endif
2847
2848  if (arg->argc > arg->argn)
2849    FindExec(arg->bundle, arg->cmd->args, arg->argc, arg->argn, arg->argv,
2850             arg->prompt, arg->cx);
2851  else if (arg->prompt)
2852    prompt_Printf(arg->prompt, "Use `%s help' to get a list or `%s help"
2853                  " <option>' for syntax help.\n", cmd, cmd);
2854  else
2855    log_Printf(LogWARN, "%s command must have arguments\n", cmd);
2856
2857  return 0;
2858}
2859
2860static int
2861IfaceAddCommand(struct cmdargs const *arg)
2862{
2863  int bits, n, how;
2864  struct in_addr ifa, mask, brd;
2865
2866  if (arg->argc == arg->argn + 1) {
2867    if (!ParseAddr(NULL, arg->argv[arg->argn], &ifa, NULL, NULL))
2868      return -1;
2869    mask.s_addr = brd.s_addr = INADDR_BROADCAST;
2870  } else {
2871    if (arg->argc == arg->argn + 2) {
2872      if (!ParseAddr(NULL, arg->argv[arg->argn], &ifa, &mask, &bits))
2873        return -1;
2874      n = 1;
2875    } else if (arg->argc == arg->argn + 3) {
2876      if (!ParseAddr(NULL, arg->argv[arg->argn], &ifa, NULL, NULL))
2877        return -1;
2878      if (!ParseAddr(NULL, arg->argv[arg->argn + 1], &mask, NULL, NULL))
2879        return -1;
2880      n = 2;
2881    } else
2882      return -1;
2883
2884    if (!ParseAddr(NULL, arg->argv[arg->argn + n], &brd, NULL, NULL))
2885      return -1;
2886  }
2887
2888  how = IFACE_ADD_LAST;
2889  if (arg->cmd->args)
2890    how |= IFACE_FORCE_ADD;
2891
2892  return !iface_inAdd(arg->bundle->iface, ifa, mask, brd, how);
2893}
2894
2895static int
2896IfaceDeleteCommand(struct cmdargs const *arg)
2897{
2898  struct in_addr ifa;
2899  int ok;
2900
2901  if (arg->argc != arg->argn + 1)
2902    return -1;
2903
2904  if (!ParseAddr(NULL, arg->argv[arg->argn], &ifa, NULL, NULL))
2905    return -1;
2906
2907  if (arg->bundle->ncp.ipcp.fsm.state == ST_OPENED &&
2908      arg->bundle->ncp.ipcp.my_ip.s_addr == ifa.s_addr) {
2909    log_Printf(LogWARN, "%s: Cannot remove active interface address\n",
2910               inet_ntoa(ifa));
2911    return 1;
2912  }
2913
2914  ok = iface_inDelete(arg->bundle->iface, ifa);
2915  if (!ok) {
2916    if (arg->cmd->args)
2917      ok = 1;
2918    else if (arg->prompt)
2919      prompt_Printf(arg->prompt, "%s: No such address\n", inet_ntoa(ifa));
2920    else
2921      log_Printf(LogWARN, "%s: No such address\n", inet_ntoa(ifa));
2922  }
2923
2924  return !ok;
2925}
2926
2927static int
2928IfaceClearCommand(struct cmdargs const *arg)
2929{
2930  int how;
2931
2932  if (arg->argc != arg->argn)
2933    return -1;
2934
2935  how = arg->bundle->ncp.ipcp.fsm.state == ST_OPENED ||
2936        arg->bundle->phys_type.all & PHYS_AUTO ?
2937        IFACE_CLEAR_ALIASES : IFACE_CLEAR_ALL;
2938  iface_Clear(arg->bundle->iface, how);
2939
2940  return 0;
2941}
2942
2943static int
2944SetProcTitle(struct cmdargs const *arg)
2945{
2946  static char title[LINE_LEN];
2947  char *argv[MAXARGS], *ptr;
2948  int len, remaining, f, argc = arg->argc - arg->argn;
2949
2950  if (arg->argc == arg->argn) {
2951    SetTitle(NULL);
2952    return 0;
2953  }
2954
2955  if (argc >= sizeof argv / sizeof argv[0]) {
2956    argc = sizeof argv / sizeof argv[0] - 1;
2957    log_Printf(LogWARN, "Truncating proc title to %d args\n", argc);
2958  }
2959  command_Expand(argv, argc, arg->argv + arg->argn, arg->bundle, 1, getpid());
2960
2961  ptr = title;
2962  remaining = sizeof title - 1;
2963  for (f = 0; f < argc && remaining; f++) {
2964    if (f) {
2965      *ptr++ = ' ';
2966      remaining--;
2967    }
2968    len = strlen(argv[f]);
2969    if (len > remaining)
2970      len = remaining;
2971    memcpy(ptr, argv[f], len);
2972    remaining -= len;
2973    ptr += len;
2974  }
2975  *ptr = '\0';
2976
2977  SetTitle(title);
2978
2979  return 0;
2980}
2981